Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-3348 (GCVE-0-2021-3348)
Vulnerability from cvelistv5
Published
2021-02-01 03:43
Modified
2024-08-03 16:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:53:17.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2021/01/28/3" }, { "name": "[oss-security] 20210201 Re: Re: Linux kernel: linux-block: nbd: use-after-free Read in nbd_queue_rq", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/02/01/1" }, { "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-30T23:06:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.openwall.com/lists/oss-security/2021/01/28/3" }, { "name": "[oss-security] 20210201 Re: Re: Linux kernel: linux-block: nbd: use-after-free Read in nbd_queue_rq", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/02/01/1" }, { "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-3348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258" }, { "name": "https://www.openwall.com/lists/oss-security/2021/01/28/3", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2021/01/28/3" }, { "name": "[oss-security] 20210201 Re: Re: Linux kernel: linux-block: nbd: use-after-free Read in nbd_queue_rq", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/02/01/1" }, { "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-3348", "datePublished": "2021-02-01T03:43:32", "dateReserved": "2021-02-01T00:00:00", "dateUpdated": "2024-08-03T16:53:17.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-3348\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-02-01T04:15:14.430\",\"lastModified\":\"2024-11-21T06:21:21.300\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.\"},{\"lang\":\"es\",\"value\":\"En la funci\u00f3n nbd_add_socket en el archivo drivers/block/nbd.c en el kernel de Linux versiones hasta 5.10.12, presenta un uso de la memoria previamente liberada de ndb_queue_rq que podr\u00eda ser desencadenado por atacantes locales (con acceso al dispositivo nbd) por medio de una petici\u00f3n de E/S en un punto determinado durante la configuraci\u00f3n del dispositivo, tambi\u00e9n se conoce como CID-b98e762e3d71\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":4.4,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"},{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.10.12\",\"matchCriteriaId\":\"8A8E7F05-FF68-4B1A-BE6E-F802E06C69FC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/02/01/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2021/01/28/3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/02/01/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2021/01/28/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
opensuse-su-2021:0241-1
Vulnerability from csaf_opensuse
Published
2021-02-05 15:14
Modified
2021-02-05 15:14
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
The following non-security bugs were fixed:
- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu: prevent double kfree ttm->sg (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/aspeed: Fix Kconfig warning & subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning & subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: * context changes
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: * context changes
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine->wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- module: delay kobject uevent until after module init call (bsc#1178631).
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr->ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- Revert 'nfsd4: support change_attr_type attribute' (for-next).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base->next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
Patchnames
openSUSE-2021-241
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).\n- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).\n- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).\n\nThe following non-security bugs were fixed:\n\n- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).\n- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).\n- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).\n- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).\n- ACPI: sysfs: Prefer \u0027compatible\u0027 modalias (git-fixes).\n- ALSA: doc: Fix reference to mixart.rst (git-fixes).\n- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).\n- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).\n- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).\n- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).\n- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).\n- ALSA: hda/via: Add minimum mute flag (git-fixes).\n- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).\n- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).\n- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).\n- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).\n- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).\n- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).\n- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).\n- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).\n- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).\n- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).\n- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).\n- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).\n- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).\n- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).\n- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).\n- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).\n- arm64: pgtable: Fix pte_accessible() (bsc#1180130).\n- ASoC: ak4458: correct reset polarity (git-fixes).\n- ASoC: dapm: remove widget from dirty list on free (git-fixes).\n- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).\n- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).\n- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).\n- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).\n- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).\n- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).\n- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).\n- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).\n- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).\n- can: dev: prevent potential information leak in can_fill_info() (git-fixes).\n- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).\n- CDC-NCM: remove \u0027connected\u0027 log message (git-fixes).\n- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).\n- crypto: asym_tpm: correct zero out potential secrets (git-fixes).\n- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).\n- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).\n- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:\n- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).\n- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).\n- drm/amd/display: Avoid MST manager resource leak (git-fixes).\n- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).\n- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).\n- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).\n- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).\n- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).\n- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).\n- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).\n- drm/amd/display: Increase timeout for DP Disable (git-fixes).\n- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amd/display: Retry AUX write when fail occurs (git-fixes).\n- drm/amd/display: Stop if retimer is not available (git-fixes).\n- drm/amd/display: update nv1x stutter latencies (git-fixes).\n- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).\n- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).\n- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).\n- drm/amdgpu: do not map BO in reserved region (git-fixes).\n- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).\n- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).\n- drm/amdgpu: increase atombios cmd timeout (git-fixes).\n- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).\n- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).\n- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu: prevent double kfree ttm-\u003esg (git-fixes).\n- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).\n- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).\n- drm/amdkfd: fix a memory leak issue (git-fixes).\n- drm/amdkfd: Fix leak in dmabuf import (git-fixes).\n- drm/amdkfd: fix restore worker race condition (git-fixes).\n- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).\n- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).\n- drm/aspeed: Fix Kconfig warning \u0026 subsequent build errors (bsc#1152472)\n- drm/aspeed: Fix Kconfig warning \u0026 subsequent build errors (git-fixes).\n- drm/atomic: put state on error path (git-fixes).\n- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)\n- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).\n- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).\n- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).\n- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: \t* context changes\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).\n- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).\n- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).\n- drm/i915: Check for all subplatform bits (git-fixes).\n- drm/i915: clear the gpu reloc batch (git-fixes).\n- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: \t* context changes\n- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).\n- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).\n- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).\n- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).\n- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).\n- drm/i915: Force VT\u0027d workarounds when running as a guest OS (git-fixes).\n- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).\n- drm/i915/gt: Delay execlist processing for tgl (git-fixes).\n- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).\n- drm/i915/gt: Prevent use of engine-\u003ewa_ctx after error (git-fixes).\n- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).\n- drm/i915/gvt: return error when failing to take the module reference (git-fixes).\n- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).\n- drm/i915: Handle max_bpc==16 (git-fixes).\n- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).\n- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)\n- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).\n- drm/msm/a6xx: fix a potential overflow issue (git-fixes).\n- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).\n- drm/msm: add shutdown support for display platform_driver (git-fixes).\n- drm/msm: Disable preemption on all 5xx targets (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dpu: Fix scale params in plane validation (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).\n- drm/msm: fix leaks if initialization fails (git-fixes).\n- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).\n- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).\n- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).\n- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).\n- drm/nouveau/mmu: fix vram heap sizing (git-fixes).\n- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).\n- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).\n- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).\n- drm/omap: fix incorrect lock state (git-fixes).\n- drm/omap: fix possible object reference leak (git-fixes).\n- drm/panfrost: add amlogic reset quirk callback (git-fixes).\n- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- drm/scheduler: Avoid accessing freed bad job (git-fixes).\n- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)\n- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).\n- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).\n- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).\n- drm/sun4i: mixer: Extend regmap max_register (git-fixes).\n- drm/syncobj: Fix use-after-free (git-fixes).\n- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).\n- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).\n- drm/ttm: fix eviction valuable range check (git-fixes).\n- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)\n- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).\n- drm/tve200: Stabilize enable/disable (git-fixes).\n- drm/vc4: drv: Add error handding for bind (git-fixes).\n- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).\n- ehci: fix EHCI host controller initialization sequence (git-fixes).\n- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).\n- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 (\u0027kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\u0027)\n- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).\n- floppy: reintroduce O_NDELAY fix (boo#1181018).\n- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).\n- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).\n- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).\n- futex: Remove needless goto\u0027s (bsc#1149032).\n- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).\n- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).\n- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).\n- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).\n- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).\n- HID: logitech-dj: add the G602 receiver (git-fixes).\n- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).\n- HID: multitouch: do not filter mice nodes (git-fixes).\n- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).\n- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).\n- HID: wacom: Constify attribute_groups (git-fixes).\n- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).\n- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).\n- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).\n- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).\n- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).\n- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).\n- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).\n- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).\n- iio: ad5504: Fix setting power-down state (git-fixes).\n- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).\n- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).\n- ionic: account for vlan tag len in rx buffer len (bsc#1167773).\n- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).\n- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).\n- KVM: nVMX: Reload vmcs01 if getting vmcs12\u0027s pages fails (bsc#1181218).\n- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).\n- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/genalloc: fix the overflow when size is too big (git-fixes).\n- lockd: do not use interval-based rebinding over TCP (for-next).\n- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).\n- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).\n- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).\n- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).\n- media: dvb-usb: Fix use-after-free access (bsc#1181104).\n- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).\n- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).\n- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).\n- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).\n- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).\n- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).\n- module: delay kobject uevent until after module init call (bsc#1178631).\n- mt7601u: fix kernel crash unplugging the device (git-fixes).\n- mt7601u: fix rx buffer refcounting (git-fixes).\n- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).\n- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).\n- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).\n- net: hns3: fix a phy loopback fail issue (bsc#1154353).\n- net: hns3: remove a misused pragma packed (bsc#1154353).\n- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).\n- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).\n- net/smc: cancel event worker during device removal (git-fixes).\n- net/smc: check for valid ib_client_data (git-fixes).\n- net/smc: fix cleanup for linkgroup setup failures (git-fixes).\n- net/smc: fix direct access to ib_gid_addr-\u003endev in smc_ib_determine_gid() (git-fixes).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: fix valid DMBE buffer sizes (git-fixes).\n- net/smc: no peer ID in CLC decline for SMCD (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: transfer fasync_list in case of fallback (git-fixes).\n- net: sunrpc: Fix \u0027snprintf\u0027 return value check in \u0027do_xprt_debugfs\u0027 (for-next).\n- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).\n- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).\n- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).\n- nfs_common: need lock during iterate through the list (for-next).\n- nfsd4: readdirplus shouldn\u0027t return parent of export (git-fixes).\n- nfsd: Fix message level for normal termination (for-next).\n- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).\n- NFS: nfs_igrab_and_active must first reference the superblock (for-next).\n- NFS/pNFS: Fix a leak of the layout \u0027plh_outstanding\u0027 counter (for-next).\n- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).\n- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).\n- NFSv4.2: condition READDIR\u0027s mask for security label based on LSM state (for-next).\n- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).\n- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).\n- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).\n- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).\n- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).\n- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).\n- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).\n- PM: hibernate: flush swap writer after marking (git-fixes).\n- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).\n- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).\n- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).\n- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).\n- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).\n- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).\n- power: vexpress: add suppress_bind_attrs to true (git-fixes).\n- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).\n- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).\n- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).\n- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).\n- Revert \u0027nfsd4: support change_attr_type attribute\u0027 (for-next).\n- Revive usb-audio Keep Interface mixer (bsc#1181014).\n- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).\n- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).\n- s390/dasd: fix list corruption of lcu list (git-fixes).\n- s390/dasd: fix list corruption of pavgroup group list (git-fixes).\n- s390/dasd: prevent inconsistent LCU device data (git-fixes).\n- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).\n- s390/qeth: consolidate online/offline code (git-fixes).\n- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).\n- s390/qeth: fix deadlock during recovery (git-fixes).\n- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).\n- s390/qeth: fix locking for discipline setup / removal (git-fixes).\n- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).\n- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).\n- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).\n- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).\n- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).\n- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).\n- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).\n- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).\n- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).\n- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).\n- scsi: lpfc: Fix target reset failing (bsc#1180891).\n- scsi: lpfc: Fix vport create logging (bsc#1180891).\n- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).\n- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).\n- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).\n- scsi: lpfc: Simplify bool comparison (bsc#1180891).\n- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).\n- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).\n- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).\n- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).\n- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).\n- selftests: net: fib_tests: remove duplicate log test (git-fixes).\n- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).\n- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).\n- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).\n- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).\n- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).\n- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).\n- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).\n- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).\n- spi: cadence: cache reference clock rate during probe (git-fixes).\n- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).\n- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).\n- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).\n- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).\n- timers: Use only bucket expiry for base-\u003enext_expiry value (bsc#1181318).\n- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).\n- USB: cdc-acm: blacklist another IR Droid device (git-fixes).\n- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).\n- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).\n- usb: dwc3: core: Properly default unspecified speed (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- USB: ehci: fix an interrupt calltrace error (git-fixes).\n- usb: gadget: aspeed: fix stop dma register setting (git-fixes).\n- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).\n- usb: gadget: enable super speed plus (git-fixes).\n- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).\n- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).\n- USB: serial: option: add LongSung M5710 module support (git-fixes).\n- USB: serial: option: add Quectel EM160R-GL (git-fixes).\n- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).\n- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).\n- usb: udc: core: Use lock when write to soft_connect (git-fixes).\n- USB: usblp: fix DMA to stack (git-fixes).\n- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).\n- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).\n- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).\n- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).\n- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).\n- video: fbdev: pvr2fb: initialize variables (git-fixes).\n- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).\n- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).\n- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).\n- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).\n- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).\n- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).\n- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).\n- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).\n- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).\n- xen/privcmd: allow fetching resource sizes (bsc#1065600).\n- xfs: show the proper user quota options (bsc#1181538).\n- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).\n- xhci: tegra: Delay for disabling LFPS detector (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-241", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0241-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:0241-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:0241-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1163930", "url": "https://bugzilla.suse.com/1163930" }, { "category": "self", "summary": "SUSE Bug 1165545", "url": "https://bugzilla.suse.com/1165545" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1172355", "url": "https://bugzilla.suse.com/1172355" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176831", "url": "https://bugzilla.suse.com/1176831" }, { "category": "self", "summary": "SUSE Bug 1178142", "url": "https://bugzilla.suse.com/1178142" }, { "category": "self", "summary": "SUSE Bug 1178631", "url": "https://bugzilla.suse.com/1178631" }, { "category": "self", "summary": "SUSE Bug 1179142", "url": "https://bugzilla.suse.com/1179142" }, { "category": "self", "summary": "SUSE Bug 1179396", "url": "https://bugzilla.suse.com/1179396" }, { "category": "self", "summary": "SUSE Bug 1179508", "url": "https://bugzilla.suse.com/1179508" }, { "category": "self", "summary": "SUSE Bug 1179509", "url": "https://bugzilla.suse.com/1179509" }, { "category": "self", "summary": "SUSE Bug 1179567", "url": "https://bugzilla.suse.com/1179567" }, { "category": "self", "summary": "SUSE Bug 1179572", "url": "https://bugzilla.suse.com/1179572" }, { "category": "self", "summary": "SUSE Bug 1180130", "url": "https://bugzilla.suse.com/1180130" }, { "category": "self", "summary": "SUSE Bug 1180264", "url": "https://bugzilla.suse.com/1180264" }, { "category": "self", "summary": "SUSE Bug 1180412", "url": "https://bugzilla.suse.com/1180412" }, { "category": "self", "summary": "SUSE Bug 1180759", "url": "https://bugzilla.suse.com/1180759" }, { "category": "self", "summary": "SUSE Bug 1180765", "url": "https://bugzilla.suse.com/1180765" }, { "category": "self", "summary": "SUSE Bug 1180809", "url": "https://bugzilla.suse.com/1180809" }, { "category": "self", "summary": "SUSE Bug 1180812", "url": "https://bugzilla.suse.com/1180812" }, { "category": "self", "summary": "SUSE Bug 1180848", "url": "https://bugzilla.suse.com/1180848" }, { "category": "self", "summary": "SUSE Bug 1180889", "url": "https://bugzilla.suse.com/1180889" }, { "category": "self", "summary": "SUSE Bug 1180891", "url": "https://bugzilla.suse.com/1180891" }, { "category": "self", "summary": "SUSE Bug 1180971", "url": "https://bugzilla.suse.com/1180971" }, { "category": "self", "summary": "SUSE Bug 1181014", "url": "https://bugzilla.suse.com/1181014" }, { "category": "self", "summary": "SUSE Bug 1181018", "url": "https://bugzilla.suse.com/1181018" }, { "category": "self", "summary": "SUSE Bug 1181077", "url": "https://bugzilla.suse.com/1181077" }, { "category": "self", "summary": "SUSE Bug 1181104", "url": "https://bugzilla.suse.com/1181104" }, { "category": "self", "summary": "SUSE Bug 1181148", "url": "https://bugzilla.suse.com/1181148" }, { "category": "self", "summary": "SUSE Bug 1181158", "url": "https://bugzilla.suse.com/1181158" }, { "category": "self", "summary": "SUSE Bug 1181161", "url": "https://bugzilla.suse.com/1181161" }, { "category": "self", "summary": "SUSE Bug 1181169", "url": "https://bugzilla.suse.com/1181169" }, { "category": "self", "summary": "SUSE Bug 1181203", "url": "https://bugzilla.suse.com/1181203" }, { "category": "self", "summary": "SUSE Bug 1181217", "url": "https://bugzilla.suse.com/1181217" }, { "category": "self", "summary": "SUSE Bug 1181218", "url": "https://bugzilla.suse.com/1181218" }, { "category": "self", "summary": "SUSE Bug 1181219", "url": "https://bugzilla.suse.com/1181219" }, { "category": "self", "summary": "SUSE Bug 1181220", "url": "https://bugzilla.suse.com/1181220" }, { "category": "self", "summary": "SUSE Bug 1181237", "url": "https://bugzilla.suse.com/1181237" }, { "category": "self", "summary": "SUSE Bug 1181318", "url": "https://bugzilla.suse.com/1181318" }, { "category": "self", "summary": "SUSE Bug 1181335", "url": "https://bugzilla.suse.com/1181335" }, { "category": "self", "summary": "SUSE Bug 1181346", "url": "https://bugzilla.suse.com/1181346" }, { "category": "self", "summary": "SUSE Bug 1181349", "url": "https://bugzilla.suse.com/1181349" }, { "category": "self", "summary": "SUSE Bug 1181425", "url": "https://bugzilla.suse.com/1181425" }, { "category": "self", "summary": "SUSE Bug 1181494", "url": "https://bugzilla.suse.com/1181494" }, { "category": "self", "summary": "SUSE Bug 1181504", "url": "https://bugzilla.suse.com/1181504" }, { "category": "self", "summary": "SUSE Bug 1181511", "url": "https://bugzilla.suse.com/1181511" }, { "category": "self", "summary": "SUSE Bug 1181538", "url": "https://bugzilla.suse.com/1181538" }, { "category": "self", "summary": "SUSE Bug 1181584", "url": "https://bugzilla.suse.com/1181584" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25211 page", "url": "https://www.suse.com/security/cve/CVE-2020-25211/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29568 page", "url": "https://www.suse.com/security/cve/CVE-2020-29568/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29569 page", "url": "https://www.suse.com/security/cve/CVE-2020-29569/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0342 page", "url": "https://www.suse.com/security/cve/CVE-2021-0342/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20177 page", "url": "https://www.suse.com/security/cve/CVE-2021-20177/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3347 page", "url": "https://www.suse.com/security/cve/CVE-2021-3347/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3348 page", "url": "https://www.suse.com/security/cve/CVE-2021-3348/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-02-05T15:14:38Z", "generator": { "date": "2021-02-05T15:14:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:0241-1", "initial_release_date": "2021-02-05T15:14:38Z", "revision_history": [ { "date": "2021-02-05T15:14:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-lp152.63.1.noarch", "product": { "name": "kernel-devel-5.3.18-lp152.63.1.noarch", "product_id": "kernel-devel-5.3.18-lp152.63.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-lp152.63.1.noarch", "product": { "name": "kernel-docs-5.3.18-lp152.63.1.noarch", "product_id": "kernel-docs-5.3.18-lp152.63.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-lp152.63.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-lp152.63.1.noarch", "product_id": "kernel-docs-html-5.3.18-lp152.63.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-lp152.63.1.noarch", "product": { "name": "kernel-macros-5.3.18-lp152.63.1.noarch", "product_id": "kernel-macros-5.3.18-lp152.63.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-lp152.63.1.noarch", "product": { "name": "kernel-source-5.3.18-lp152.63.1.noarch", "product_id": "kernel-source-5.3.18-lp152.63.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-lp152.63.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-debug-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-debug-5.3.18-lp152.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-lp152.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-default-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-default-5.3.18-lp152.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "product": { "name": "kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "product_id": "kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-default-devel-5.3.18-lp152.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-lp152.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-obs-build-5.3.18-lp152.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-lp152.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-preempt-5.3.18-lp152.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-lp152.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-lp152.63.1.x86_64", "product": { "name": "kernel-syms-5.3.18-lp152.63.1.x86_64", "product_id": "kernel-syms-5.3.18-lp152.63.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-debug-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-default-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64" }, "product_reference": "kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64" }, "product_reference": "kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-lp152.63.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch" }, "product_reference": "kernel-devel-5.3.18-lp152.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-lp152.63.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch" }, "product_reference": "kernel-docs-5.3.18-lp152.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-5.3.18-lp152.63.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch" }, "product_reference": "kernel-docs-html-5.3.18-lp152.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-lp152.63.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch" }, "product_reference": "kernel-macros-5.3.18-lp152.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-lp152.63.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch" }, "product_reference": "kernel-source-5.3.18-lp152.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.3.18-lp152.63.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch" }, "product_reference": "kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-lp152.63.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-lp152.63.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25211" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25211", "url": "https://www.suse.com/security/cve/CVE-2020-25211" }, { "category": "external", "summary": "SUSE Bug 1176395 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1176395" }, { "category": "external", "summary": "SUSE Bug 1192356 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1192356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:14:38Z", "details": "moderate" } ], "title": "CVE-2020-25211" }, { "cve": "CVE-2020-29568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29568" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29568", "url": "https://www.suse.com/security/cve/CVE-2020-29568" }, { "category": "external", "summary": "SUSE Bug 1179508 for CVE-2020-29568", "url": "https://bugzilla.suse.com/1179508" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:14:38Z", "details": "moderate" } ], "title": "CVE-2020-29568" }, { "cve": "CVE-2020-29569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29569" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29569", "url": "https://www.suse.com/security/cve/CVE-2020-29569" }, { "category": "external", "summary": "SUSE Bug 1179509 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1179509" }, { "category": "external", "summary": "SUSE Bug 1180008 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1180008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:14:38Z", "details": "important" } ], "title": "CVE-2020-29569" }, { "cve": "CVE-2021-0342", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0342" } ], "notes": [ { "category": "general", "text": "In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0342", "url": "https://www.suse.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "SUSE Bug 1180812 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180812" }, { "category": "external", "summary": "SUSE Bug 1180859 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:14:38Z", "details": "important" } ], "title": "CVE-2021-0342" }, { "cve": "CVE-2021-20177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20177" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20177", "url": "https://www.suse.com/security/cve/CVE-2021-20177" }, { "category": "external", "summary": "SUSE Bug 1180765 for CVE-2021-20177", "url": "https://bugzilla.suse.com/1180765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:14:38Z", "details": "moderate" } ], "title": "CVE-2021-20177" }, { "cve": "CVE-2021-3347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3347" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3347", "url": "https://www.suse.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "SUSE Bug 1181349 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181349" }, { "category": "external", "summary": "SUSE Bug 1181553 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181553" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:14:38Z", "details": "important" } ], "title": "CVE-2021-3347" }, { "cve": "CVE-2021-3348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3348" } ], "notes": [ { "category": "general", "text": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3348", "url": "https://www.suse.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "SUSE Bug 1181504 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181504" }, { "category": "external", "summary": "SUSE Bug 1181645 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.63.1.lp152.8.21.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.63.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.63.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:14:38Z", "details": "moderate" } ], "title": "CVE-2021-3348" } ] }
gsd-2021-3348
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-3348", "description": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "id": "GSD-2021-3348", "references": [ "https://www.suse.com/security/cve/CVE-2021-3348.html", "https://access.redhat.com/errata/RHSA-2021:4356", "https://access.redhat.com/errata/RHSA-2021:4140", "https://ubuntu.com/security/CVE-2021-3348", "https://advisories.mageia.org/CVE-2021-3348.html", "https://security.archlinux.org/CVE-2021-3348", "https://alas.aws.amazon.com/cve/html/CVE-2021-3348.html", "https://linux.oracle.com/cve/CVE-2021-3348.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-3348" ], "details": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "id": "GSD-2021-3348", "modified": "2023-12-13T01:23:34.636099Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-3348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258" }, { "name": "https://www.openwall.com/lists/oss-security/2021/01/28/3", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2021/01/28/3" }, { "name": "[oss-security] 20210201 Re: Re: Linux kernel: linux-block: nbd: use-after-free Read in nbd_queue_rq", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/02/01/1" }, { "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.10.12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-3348" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-362" }, { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258" }, { "name": "https://www.openwall.com/lists/oss-security/2021/01/28/3", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2021/01/28/3" }, { "name": "[oss-security] 20210201 Re: Re: Linux kernel: linux-block: nbd: use-after-free Read in nbd_queue_rq", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/02/01/1" }, { "name": "[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9 } }, "lastModifiedDate": "2022-04-26T16:17Z", "publishedDate": "2021-02-01T04:15Z" } } }
suse-su-2021:0739-1
Vulnerability from csaf_suse
Published
2021-03-09 15:08
Modified
2021-03-09 15:08
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel Azure was updated to receive various security and bugfixes.
The following security bugs was fixed:
- CVE-2021-3348: Fixed a use-after-free read in nbd_queue_rq (bsc#1181504).
The following non-security bugs were fixed:
- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- block: fix use-after-free in disk_part_iter_next (bsc#1182610).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: correctly calculate item size used when item key collision happens (bsc#1181996).
- btrfs: correctly validate compression type (bsc#1182269).
- btrfs: delete the ordered isize update code (bsc#1181998).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: do not set path->leave_spinning for truncate (bsc#1181998).
- btrfs: factor out extent dropping code from hole punch handler (bsc#1182038).
- btrfs: fix cloning range with a hole when using the NO_HOLES feature (bsc#1182038).
- btrfs: fix data bytes_may_use underflow with fallocate due to failed quota reserve (bsc#1182130)
- btrfs: fix ENOSPC errors, leading to transaction aborts, when cloning extents (bsc#1182038).
- btrfs: fix hole extent items with a zero size after range cloning (bsc#1182038).
- btrfs: fix lost i_size update after cloning inline extent (bsc#1181998).
- btrfs: fix mount failure caused by race with umount (bsc#1182248).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix unexpected cow in run_delalloc_nocow (bsc#1181987).
- btrfs: fix unexpected failure of nocow buffered writes after snapshotting when low on space (bsc#1181987).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: incremental send, fix file corruption when no-holes feature is enabled (bsc#1182184).
- btrfs: Introduce extent_io_tree::owner to distinguish different io_trees (bsc#1181998).
- btrfs: introduce per-inode file extent tree (bsc#1181998).
- btrfs: prepare for extensions in compression options (bsc#1182269).
- btrfs: prop: fix vanished compression property after failed set (bsc#1182269).
- btrfs: prop: fix zstd compression parameter validation (bsc#1182269).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1181998).
- btrfs: send, allow clone operations within the same file (bsc#1182173)
- btrfs: send, do not issue unnecessary truncate operations (bsc#1182173)
- btrfs: send, fix emission of invalid clone operations within the same file (bsc#1182173)
- btrfs: send, fix incorrect file layout after hole punching beyond eof (bsc#1182173).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1182173)
- btrfs: send, fix missing truncate for inode with prealloc extent past eof (bsc#1182173).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1182243 bsc#1182242).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1182243).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: transaction: Avoid deadlock due to bad initialization timing of fs_info::journal_info (bsc#1181931).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- btrfs: Use bd_dev to generate index when dev_state_hashtable add items (bsc#1181931).
- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1181998).
- btrfs: use the file extent tree infrastructure (bsc#1181998).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- dm: avoid filesystem lookup in dm_get_dev_t() (bsc#1178049).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- Fix unsynchronized access to sev members through svm_register_enc_region (bsc#1114648).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- fs: move I_DIRTY_INODE to fs.h (bsc#1182612).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernfs: deal with kernfs_fill_super() failures (bsc#1181809).
- KVM: apic: Flush TLB after APIC mode/address change if VPIDs are in use (bsc#1182302).
- KVM: Fix kABI for set_virtual_apic_mode (bsc#1182310).
- KVM: Fix kABI for tlb_flush (bsc#1182195).
- KVM-vmx-Basic-APIC-virtualization-controls-have-thre.patch: (bsc#1182310).
- KVM: VMX: check for existence of secondary exec controls before accessing (bsc#1182438).
- KVM: VMX: hide flexpriority from guest when disabled at the module level (bsc#1182448).
- KVM-vmx-Introduce-lapic_mode-enumeration.patch: (bsc#1182307).
- KVM: x86: emulate RDPID (bsc#1182182).
- KVM: x86: emulating RDPID failure shall return #UD rather than
- KVM: X86: introduce invalidate_gpa argument to tlb flush (bsc#1182195).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: pwc: Use correct device for DMA (git-fixes).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).
- net: bcmgenet: add support for ethtool rxnfc flows (git-fixes).
- net: bcmgenet: code movement (git-fixes).
- net: bcmgenet: fix mask check in bcmgenet_validate_flow() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use __be16 for htons(ETH_P_IP) (git-fixes).
- net: bcmgenet: Use correct I/O accessors (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- nvme-multipath: Early exit if no path is available (git-fixes).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- quota: Fix error codes in v2_read_file_info() (bsc#1182652).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- s390/pci: adaptation of iommu to multifunction (bsc#1179612).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: target: Fix truncated PR-in ReadKeys response (bsc#1182590).
- scsi: target: fix unmap_zeroes_data boolean initialisation (bsc#1163617).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- tools lib traceevent: Fix 'robust' test of do_generate_dynamic_list_file (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: musb: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1179612).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1114648).
- x86/efistub: Disable paging at mixed mode entry (bsc#1114648).
- x86/entry/64/compat: Fix 'x86/entry/64/compat: Preserve r8-r11 in int $0x80' (bsc#1114648).
- x86/entry/64/compat: Preserve r8-r11 in int $0x80 (bsc#1114648).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1114648).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1114648).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).
Patchnames
SUSE-2021-739,SUSE-SLE-SERVER-12-SP5-2021-739
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel Azure was updated to receive various security and bugfixes.\n\nThe following security bugs was fixed:\n\n- CVE-2021-3348: Fixed a use-after-free read in nbd_queue_rq (bsc#1181504).\n\nThe following non-security bugs were fixed:\n\n- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).\n- ACPI: property: Fix fwnode string properties matching (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).\n- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).\n- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)\n- ASoC: cs42l56: fix up error handling in probe (git-fixes).\n- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).\n- block: fix use-after-free in disk_part_iter_next (bsc#1182610).\n- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- Bluetooth: drop HCI device reference before return (git-fixes).\n- Bluetooth: Fix initializing response id after clearing struct (git-fixes).\n- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).\n- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).\n- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).\n- btrfs: Cleanup try_flush_qgroup (bsc#1182047).\n- btrfs: correctly calculate item size used when item key collision happens (bsc#1181996).\n- btrfs: correctly validate compression type (bsc#1182269).\n- btrfs: delete the ordered isize update code (bsc#1181998).\n- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: do not set path-\u003eleave_spinning for truncate (bsc#1181998).\n- btrfs: factor out extent dropping code from hole punch handler (bsc#1182038).\n- btrfs: fix cloning range with a hole when using the NO_HOLES feature (bsc#1182038).\n- btrfs: fix data bytes_may_use underflow with fallocate due to failed quota reserve (bsc#1182130)\n- btrfs: fix ENOSPC errors, leading to transaction aborts, when cloning extents (bsc#1182038).\n- btrfs: fix hole extent items with a zero size after range cloning (bsc#1182038).\n- btrfs: fix lost i_size update after cloning inline extent (bsc#1181998).\n- btrfs: fix mount failure caused by race with umount (bsc#1182248).\n- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).\n- btrfs: fix unexpected cow in run_delalloc_nocow (bsc#1181987).\n- btrfs: fix unexpected failure of nocow buffered writes after snapshotting when low on space (bsc#1181987).\n- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: incremental send, fix file corruption when no-holes feature is enabled (bsc#1182184).\n- btrfs: Introduce extent_io_tree::owner to distinguish different io_trees (bsc#1181998).\n- btrfs: introduce per-inode file extent tree (bsc#1181998).\n- btrfs: prepare for extensions in compression options (bsc#1182269).\n- btrfs: prop: fix vanished compression property after failed set (bsc#1182269).\n- btrfs: prop: fix zstd compression parameter validation (bsc#1182269).\n- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1181998).\n- btrfs: send, allow clone operations within the same file (bsc#1182173)\n- btrfs: send, do not issue unnecessary truncate operations (bsc#1182173)\n- btrfs: send, fix emission of invalid clone operations within the same file (bsc#1182173)\n- btrfs: send, fix incorrect file layout after hole punching beyond eof (bsc#1182173).\n- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1182173)\n- btrfs: send, fix missing truncate for inode with prealloc extent past eof (bsc#1182173).\n- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1182243 bsc#1182242).\n- btrfs: send, recompute reference path after orphanization of a directory (bsc#1182243).\n- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- btrfs: transaction: Avoid deadlock due to bad initialization timing of fs_info::journal_info (bsc#1181931).\n- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).\n- btrfs: Use bd_dev to generate index when dev_state_hashtable add items (bsc#1181931).\n- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1181998).\n- btrfs: use the file extent tree infrastructure (bsc#1181998).\n- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).\n- dm: avoid filesystem lookup in dm_get_dev_t() (bsc#1178049).\n- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).\n- ext4: fix a memory leak of ext4_free_data (bsc#1182447).\n- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).\n- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).\n- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).\n- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).\n- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).\n- Fix unsynchronized access to sev members through svm_register_enc_region (bsc#1114648).\n- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).\n- fs: move I_DIRTY_INODE to fs.h (bsc#1182612). \n- HID: core: detect and skip invalid inputs to snto32() (git-fixes).\n- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).\n- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).\n- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).\n- ibmvnic: device remove has higher precedence over reset (bsc#1065729).\n- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).\n- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).\n- ibmvnic: serialize access to work queue on remove (bsc#1065729).\n- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).\n- Input: elo - fix an error code in elo_connect() (git-fixes).\n- Input: joydev - prevent potential read overflow in ioctl (git-fixes).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).\n- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 (\u0027rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).\u0027)\n- kernfs: deal with kernfs_fill_super() failures (bsc#1181809).\n- KVM: apic: Flush TLB after APIC mode/address change if VPIDs are in use (bsc#1182302).\n- KVM: Fix kABI for set_virtual_apic_mode (bsc#1182310).\n- KVM: Fix kABI for tlb_flush (bsc#1182195).\n- KVM-vmx-Basic-APIC-virtualization-controls-have-thre.patch: (bsc#1182310).\n- KVM: VMX: check for existence of secondary exec controls before accessing (bsc#1182438).\n- KVM: VMX: hide flexpriority from guest when disabled at the module level (bsc#1182448).\n- KVM-vmx-Introduce-lapic_mode-enumeration.patch: (bsc#1182307).\n- KVM: x86: emulate RDPID (bsc#1182182).\n- KVM: x86: emulating RDPID failure shall return #UD rather than\n- KVM: X86: introduce invalidate_gpa argument to tlb flush (bsc#1182195).\n- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).\n- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).\n- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).\n- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).\n- media: media/pci: Fix memleak in empress_init (git-fixes).\n- media: pwc: Use correct device for DMA (git-fixes).\n- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).\n- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).\n- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).\n- media: vsp1: Fix an error handling path in the probe function (git-fixes).\n- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).\n- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).\n- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).\n- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).\n- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).\n- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).\n- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).\n- net: bcmgenet: add support for ethtool rxnfc flows (git-fixes).\n- net: bcmgenet: code movement (git-fixes).\n- net: bcmgenet: fix mask check in bcmgenet_validate_flow() (git-fixes).\n- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).\n- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).\n- net: bcmgenet: set Rx mode before starting netif (git-fixes).\n- net: bcmgenet: use __be16 for htons(ETH_P_IP) (git-fixes).\n- net: bcmgenet: Use correct I/O accessors (git-fixes).\n- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854).\n- net: moxa: Fix a potential double \u0027free_irq()\u0027 (git-fixes).\n- net: sun: fix missing release regions in cas_init_one() (git-fixes).\n- nvme-multipath: Early exit if no path is available (git-fixes).\n- objtool: Do not fail on missing symbol table (bsc#1169514).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).\n- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).\n- powerpc: Fix alignment bug within the init sections (bsc#1065729).\n- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).\n- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).\n- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).\n- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).\n- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).\n- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).\n- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).\n- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).\n- quota: Fix error codes in v2_read_file_info() (bsc#1182652).\n- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).\n- quota: Sanity-check quota file headers on load (bsc#1182461).\n- regulator: axp20x: Fix reference cout leak (git-fixes).\n- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).\n- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)\n- s390/pci: adaptation of iommu to multifunction (bsc#1179612).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).\n- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).\n- scsi: target: Fix truncated PR-in ReadKeys response (bsc#1182590).\n- scsi: target: fix unmap_zeroes_data boolean initialisation (bsc#1163617).\n- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).\n- tools lib traceevent: Fix \u0027robust\u0027 test of do_generate_dynamic_list_file (git-fixes).\n- tpm_tis: Clean up locality release (git-fixes).\n- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).\n- tracing: Check length before giving out the filter buffer (git-fixes).\n- tracing: Do not count ftrace events in top level enable output (git-fixes).\n- USB: cdc-acm: blacklist another IR Droid device (git-fixes).\n- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).\n- USB: dwc2: Make \u0027trimming xfer length\u0027 a debug message (git-fixes).\n- USB: musb: Fix runtime PM race in musb_queue_resume_work (git-fixes).\n- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).\n- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).\n- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).\n- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).\n- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).\n- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).\n- USB: serial: option: add LongSung M5710 module support (git-fixes).\n- USB: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).\n- USB: usblp: fix DMA to stack (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1179612).\n- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).\n- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).\n- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1114648).\n- x86/efistub: Disable paging at mixed mode entry (bsc#1114648).\n- x86/entry/64/compat: Fix \u0027x86/entry/64/compat: Preserve r8-r11 in int $0x80\u0027 (bsc#1114648).\n- x86/entry/64/compat: Preserve r8-r11 in int $0x80 (bsc#1114648).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1114648).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1114648).\n- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).\n- xhci: fix bounce buffer usage for non-sg list case (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-739,SUSE-SLE-SERVER-12-SP5-2021-739", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0739-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0739-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210739-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0739-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008449.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1078720", "url": "https://bugzilla.suse.com/1078720" }, { "category": "self", "summary": "SUSE Bug 1081134", "url": "https://bugzilla.suse.com/1081134" }, { "category": "self", "summary": "SUSE Bug 1084610", "url": "https://bugzilla.suse.com/1084610" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1163617", "url": "https://bugzilla.suse.com/1163617" }, { "category": "self", "summary": "SUSE Bug 1163930", "url": "https://bugzilla.suse.com/1163930" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1176855", "url": "https://bugzilla.suse.com/1176855" }, { "category": "self", "summary": "SUSE Bug 1177440", "url": "https://bugzilla.suse.com/1177440" }, { "category": "self", "summary": "SUSE Bug 1178049", "url": "https://bugzilla.suse.com/1178049" }, { "category": "self", "summary": "SUSE Bug 1179082", "url": "https://bugzilla.suse.com/1179082" }, { "category": "self", "summary": "SUSE Bug 1179142", "url": "https://bugzilla.suse.com/1179142" }, { "category": "self", "summary": "SUSE Bug 1179612", "url": "https://bugzilla.suse.com/1179612" }, { "category": "self", "summary": "SUSE Bug 1179709", "url": "https://bugzilla.suse.com/1179709" }, { "category": "self", "summary": "SUSE Bug 1180058", "url": "https://bugzilla.suse.com/1180058" }, { "category": "self", "summary": "SUSE Bug 1181346", "url": "https://bugzilla.suse.com/1181346" }, { "category": "self", "summary": "SUSE Bug 1181504", "url": "https://bugzilla.suse.com/1181504" }, { "category": "self", "summary": "SUSE Bug 1181574", "url": "https://bugzilla.suse.com/1181574" }, { "category": "self", "summary": "SUSE Bug 1181671", "url": "https://bugzilla.suse.com/1181671" }, { "category": "self", "summary": "SUSE Bug 1181809", "url": "https://bugzilla.suse.com/1181809" }, { "category": "self", "summary": "SUSE Bug 1181854", "url": "https://bugzilla.suse.com/1181854" }, { "category": "self", "summary": "SUSE Bug 1181896", "url": "https://bugzilla.suse.com/1181896" }, { "category": "self", "summary": "SUSE Bug 1181931", "url": "https://bugzilla.suse.com/1181931" }, { "category": "self", "summary": "SUSE Bug 1181960", "url": "https://bugzilla.suse.com/1181960" }, { "category": "self", "summary": "SUSE Bug 1181985", "url": "https://bugzilla.suse.com/1181985" }, { "category": "self", "summary": "SUSE Bug 1181987", "url": "https://bugzilla.suse.com/1181987" }, { "category": "self", "summary": "SUSE Bug 1181996", "url": "https://bugzilla.suse.com/1181996" }, { "category": "self", "summary": "SUSE Bug 1181998", "url": "https://bugzilla.suse.com/1181998" }, { "category": "self", "summary": "SUSE Bug 1182038", "url": "https://bugzilla.suse.com/1182038" }, { "category": "self", "summary": "SUSE Bug 1182047", "url": "https://bugzilla.suse.com/1182047" }, { "category": "self", "summary": "SUSE Bug 1182118", "url": "https://bugzilla.suse.com/1182118" }, { "category": "self", "summary": "SUSE Bug 1182130", "url": "https://bugzilla.suse.com/1182130" }, { "category": "self", "summary": "SUSE Bug 1182140", "url": "https://bugzilla.suse.com/1182140" }, { "category": "self", "summary": "SUSE Bug 1182171", "url": "https://bugzilla.suse.com/1182171" }, { "category": "self", "summary": "SUSE Bug 1182173", "url": "https://bugzilla.suse.com/1182173" }, { "category": "self", "summary": "SUSE Bug 1182175", "url": "https://bugzilla.suse.com/1182175" }, { "category": "self", "summary": "SUSE Bug 1182182", "url": "https://bugzilla.suse.com/1182182" }, { "category": "self", "summary": "SUSE Bug 1182184", "url": "https://bugzilla.suse.com/1182184" }, { "category": "self", "summary": "SUSE Bug 1182195", "url": "https://bugzilla.suse.com/1182195" }, { "category": "self", "summary": "SUSE Bug 1182242", "url": "https://bugzilla.suse.com/1182242" }, { "category": "self", "summary": "SUSE Bug 1182243", "url": "https://bugzilla.suse.com/1182243" }, { "category": "self", "summary": "SUSE Bug 1182248", "url": "https://bugzilla.suse.com/1182248" }, { "category": "self", "summary": "SUSE Bug 1182269", "url": "https://bugzilla.suse.com/1182269" }, { "category": "self", "summary": "SUSE Bug 1182302", "url": "https://bugzilla.suse.com/1182302" }, { "category": "self", "summary": "SUSE Bug 1182307", "url": "https://bugzilla.suse.com/1182307" }, { "category": "self", "summary": "SUSE Bug 1182310", "url": "https://bugzilla.suse.com/1182310" }, { "category": "self", "summary": "SUSE Bug 1182438", "url": "https://bugzilla.suse.com/1182438" }, { "category": "self", "summary": "SUSE Bug 1182447", "url": "https://bugzilla.suse.com/1182447" }, { "category": "self", "summary": "SUSE Bug 1182448", "url": "https://bugzilla.suse.com/1182448" }, { "category": "self", "summary": "SUSE Bug 1182449", "url": "https://bugzilla.suse.com/1182449" }, { "category": "self", "summary": "SUSE Bug 1182460", "url": "https://bugzilla.suse.com/1182460" }, { "category": "self", "summary": "SUSE Bug 1182461", "url": "https://bugzilla.suse.com/1182461" }, { "category": "self", "summary": "SUSE Bug 1182462", "url": "https://bugzilla.suse.com/1182462" }, { "category": "self", "summary": "SUSE Bug 1182463", "url": "https://bugzilla.suse.com/1182463" }, { "category": "self", "summary": "SUSE Bug 1182464", "url": "https://bugzilla.suse.com/1182464" }, { "category": "self", "summary": "SUSE Bug 1182465", "url": "https://bugzilla.suse.com/1182465" }, { "category": "self", "summary": "SUSE Bug 1182466", "url": "https://bugzilla.suse.com/1182466" }, { "category": "self", "summary": "SUSE Bug 1182560", "url": "https://bugzilla.suse.com/1182560" }, { "category": "self", "summary": "SUSE Bug 1182561", "url": "https://bugzilla.suse.com/1182561" }, { "category": "self", "summary": "SUSE Bug 1182571", "url": "https://bugzilla.suse.com/1182571" }, { "category": "self", "summary": "SUSE Bug 1182590", "url": "https://bugzilla.suse.com/1182590" }, { "category": "self", "summary": "SUSE Bug 1182610", "url": "https://bugzilla.suse.com/1182610" }, { "category": "self", "summary": "SUSE Bug 1182612", "url": "https://bugzilla.suse.com/1182612" }, { "category": "self", "summary": "SUSE Bug 1182650", "url": "https://bugzilla.suse.com/1182650" }, { "category": "self", "summary": "SUSE Bug 1182652", "url": "https://bugzilla.suse.com/1182652" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3348 page", "url": "https://www.suse.com/security/cve/CVE-2021-3348/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-03-09T15:08:49Z", "generator": { "date": "2021-03-09T15:08:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0739-1", "initial_release_date": "2021-03-09T15:08:49Z", "revision_history": [ { "date": "2021-03-09T15:08:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.47.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.47.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.47.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.47.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.47.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.47.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.47.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.47.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.47.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.47.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.47.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.47.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.47.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.47.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.47.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.47.1.x86_64", "product_id": "kernel-azure-4.12.14-16.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.47.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.47.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.47.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.47.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.47.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.47.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.47.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.47.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.47.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.47.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.47.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.47.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.47.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.47.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.47.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.47.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.47.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.47.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.47.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.47.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.47.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.47.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.47.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.47.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.47.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.47.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.47.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.47.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.47.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.47.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.47.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.47.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.47.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.47.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.47.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3348" } ], "notes": [ { "category": "general", "text": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3348", "url": "https://www.suse.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "SUSE Bug 1181504 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181504" }, { "category": "external", "summary": "SUSE Bug 1181645 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.47.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-03-09T15:08:49Z", "details": "moderate" } ], "title": "CVE-2021-3348" } ] }
suse-su-2021:0427-1
Vulnerability from csaf_suse
Published
2021-02-10 15:45
Modified
2021-02-10 15:45
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 realtime kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
The following non-security bugs were fixed:
- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- PM: hibernate: flush swap writer after marking (git-fixes).
- Revert 'nfsd4: support change_attr_type attribute' (for-next).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- bitmap: remove unused function declaration (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu: prevent double kfree ttm->sg (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/aspeed: Fix Kconfig warning & subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning & subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472)
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine->wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489)
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- module: delay kobject uevent until after module init call (bsc#1178631).
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr->ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base->next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
Patchnames
SUSE-2021-427,SUSE-SLE-Module-RT-15-SP2-2021-427
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 realtime kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).\n- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).\n- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)\n- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).\n- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).\n\nThe following non-security bugs were fixed:\n\n- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).\n- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).\n- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).\n- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).\n- ACPI: sysfs: Prefer \u0027compatible\u0027 modalias (git-fixes).\n- ALSA: doc: Fix reference to mixart.rst (git-fixes).\n- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).\n- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).\n- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).\n- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).\n- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).\n- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).\n- ALSA: hda/realtek - Modify Dell platform name (git-fixes).\n- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).\n- ALSA: hda/realtek: Add two \u0027Intel Reference board\u0027 SSID in the ALC256 (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).\n- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).\n- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).\n- ALSA: hda/via: Add minimum mute flag (git-fixes).\n- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).\n- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).\n- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).\n- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).\n- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).\n- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).\n- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).\n- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).\n- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).\n- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).\n- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).\n- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).\n- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).\n- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).\n- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).\n- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).\n- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).\n- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).\n- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).\n- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).\n- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).\n- ASoC: ak4458: correct reset polarity (git-fixes).\n- ASoC: dapm: remove widget from dirty list on free (git-fixes).\n- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).\n- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).\n- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).\n- CDC-NCM: remove \u0027connected\u0027 log message (git-fixes).\n- EDAC/amd64: Fix PCI component registration (bsc#1152489).\n- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).\n- HID: logitech-dj: add the G602 receiver (git-fixes).\n- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).\n- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).\n- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).\n- HID: multitouch: do not filter mice nodes (git-fixes).\n- HID: wacom: Constify attribute_groups (git-fixes).\n- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).\n- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).\n- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).\n- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).\n- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).\n- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).\n- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).\n- KVM: nVMX: Reload vmcs01 if getting vmcs12\u0027s pages fails (bsc#1181218).\n- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).\n- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFS/pNFS: Fix a leak of the layout \u0027plh_outstanding\u0027 counter (for-next).\n- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).\n- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).\n- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).\n- NFS: nfs_igrab_and_active must first reference the superblock (for-next).\n- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).\n- NFSv4.2: condition READDIR\u0027s mask for security label based on LSM state (for-next).\n- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).\n- PM: hibernate: flush swap writer after marking (git-fixes).\n- Revert \u0027nfsd4: support change_attr_type attribute\u0027 (for-next).\n- Revive usb-audio Keep Interface mixer (bsc#1181014).\n- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).\n- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).\n- USB: cdc-acm: blacklist another IR Droid device (git-fixes).\n- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).\n- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- USB: ehci: fix an interrupt calltrace error (git-fixes).\n- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).\n- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).\n- USB: serial: option: add LongSung M5710 module support (git-fixes).\n- USB: serial: option: add Quectel EM160R-GL (git-fixes).\n- USB: usblp: fix DMA to stack (git-fixes).\n- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).\n- USB: yurex: fix control-URB timeout handling (git-fixes).\n- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).\n- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).\n- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).\n- arm64: pgtable: Fix pte_accessible() (bsc#1180130).\n- bitmap: remove unused function declaration (git-fixes).\n- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).\n- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).\n- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).\n- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).\n- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).\n- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).\n- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).\n- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).\n- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).\n- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).\n- can: dev: prevent potential information leak in can_fill_info() (git-fixes).\n- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).\n- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).\n- crypto: asym_tpm: correct zero out potential secrets (git-fixes).\n- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).\n- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).\n- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).\n- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).\n- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).\n- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).\n- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).\n- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).\n- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).\n- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).\n- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).\n- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:\n- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).\n- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).\n- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).\n- drm/amd/display: Avoid MST manager resource leak (git-fixes).\n- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).\n- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).\n- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).\n- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).\n- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).\n- drm/amd/display: Increase timeout for DP Disable (git-fixes).\n- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).\n- drm/amd/display: Retry AUX write when fail occurs (git-fixes).\n- drm/amd/display: Stop if retimer is not available (git-fixes).\n- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).\n- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amd/display: update nv1x stutter latencies (git-fixes).\n- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).\n- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).\n- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).\n- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).\n- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).\n- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).\n- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).\n- drm/amdgpu: do not map BO in reserved region (git-fixes).\n- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).\n- drm/amdgpu: increase atombios cmd timeout (git-fixes).\n- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).\n- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).\n- drm/amdgpu: prevent double kfree ttm-\u003esg (git-fixes).\n- drm/amdkfd: Fix leak in dmabuf import (git-fixes).\n- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).\n- drm/amdkfd: fix a memory leak issue (git-fixes).\n- drm/amdkfd: fix restore worker race condition (git-fixes).\n- drm/aspeed: Fix Kconfig warning \u0026 subsequent build errors (bsc#1152472)\n- drm/aspeed: Fix Kconfig warning \u0026 subsequent build errors (git-fixes).\n- drm/atomic: put state on error path (git-fixes).\n- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).\n- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).\n- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).\n- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).\n- drm/gma500: fix double free of gma_connector (bsc#1152472)\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).\n- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).\n- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).\n- drm/i915/gt: Delay execlist processing for tgl (git-fixes).\n- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).\n- drm/i915/gt: Prevent use of engine-\u003ewa_ctx after error (git-fixes).\n- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).\n- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).\n- drm/i915/gvt: return error when failing to take the module reference (git-fixes).\n- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).\n- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).\n- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).\n- drm/i915: Check for all subplatform bits (git-fixes).\n- drm/i915: Correctly set SFC capability for video engines (bsc#1152489)\n- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).\n- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).\n- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).\n- drm/i915: Force VT\u0027d workarounds when running as a guest OS (git-fixes).\n- drm/i915: Handle max_bpc==16 (git-fixes).\n- drm/i915: clear the gpu reloc batch (git-fixes).\n- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)\n- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).\n- drm/msm/a6xx: fix a potential overflow issue (git-fixes).\n- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dpu: Fix scale params in plane validation (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).\n- drm/msm: Disable preemption on all 5xx targets (git-fixes).\n- drm/msm: add shutdown support for display platform_driver (git-fixes).\n- drm/msm: fix leaks if initialization fails (git-fixes).\n- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).\n- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).\n- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).\n- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).\n- drm/nouveau/mmu: fix vram heap sizing (git-fixes).\n- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).\n- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).\n- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).\n- drm/nouveau: fix runtime pm imbalance on error (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).\n- drm/omap: fix incorrect lock state (git-fixes).\n- drm/omap: fix possible object reference leak (git-fixes).\n- drm/panfrost: add amlogic reset quirk callback (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- drm/scheduler: Avoid accessing freed bad job (git-fixes).\n- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)\n- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).\n- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).\n- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).\n- drm/sun4i: mixer: Extend regmap max_register (git-fixes).\n- drm/syncobj: Fix use-after-free (git-fixes).\n- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).\n- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).\n- drm/ttm: fix eviction valuable range check (git-fixes).\n- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)\n- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).\n- drm/tve200: Stabilize enable/disable (git-fixes).\n- drm/vc4: drv: Add error handding for bind (git-fixes).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).\n- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)\n- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).\n- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).\n- ehci: fix EHCI host controller initialization sequence (git-fixes).\n- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).\n- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).\n- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).\n- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).\n- floppy: reintroduce O_NDELAY fix (boo#1181018).\n- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).\n- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).\n- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).\n- futex: Remove needless goto\u0027s (bsc#1149032).\n- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).\n- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).\n- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).\n- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).\n- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).\n- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).\n- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).\n- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).\n- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).\n- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).\n- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).\n- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).\n- iio: ad5504: Fix setting power-down state (git-fixes).\n- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).\n- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).\n- ionic: account for vlan tag len in rx buffer len (bsc#1167773).\n- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).\n- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).\n- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).\n- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).\n- kdb: Fix pager search for multi-line strings (git-fixes).\n- kgdb: Drop malformed kernel doc comment (git-fixes).\n- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/genalloc: fix the overflow when size is too big (git-fixes).\n- lib/string: remove unnecessary #undefs (git-fixes).\n- lockd: do not use interval-based rebinding over TCP (for-next).\n- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).\n- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).\n- mac80211: pause TX while changing interface type (git-fixes).\n- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).\n- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).\n- media: dvb-usb: Fix use-after-free access (bsc#1181104).\n- media: gp8psk: initialize stats at power control logic (git-fixes).\n- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).\n- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).\n- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).\n- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).\n- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).\n- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).\n- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).\n- module: delay kobject uevent until after module init call (bsc#1178631).\n- mt7601u: fix kernel crash unplugging the device (git-fixes).\n- mt7601u: fix rx buffer refcounting (git-fixes).\n- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).\n- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).\n- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).\n- net/smc: cancel event worker during device removal (git-fixes).\n- net/smc: check for valid ib_client_data (git-fixes).\n- net/smc: fix cleanup for linkgroup setup failures (git-fixes).\n- net/smc: fix direct access to ib_gid_addr-\u003endev in smc_ib_determine_gid() (git-fixes).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: fix valid DMBE buffer sizes (git-fixes).\n- net/smc: no peer ID in CLC decline for SMCD (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: transfer fasync_list in case of fallback (git-fixes).\n- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).\n- net: hns3: fix a phy loopback fail issue (bsc#1154353).\n- net: hns3: remove a misused pragma packed (bsc#1154353).\n- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).\n- net: sunrpc: Fix \u0027snprintf\u0027 return value check in \u0027do_xprt_debugfs\u0027 (for-next).\n- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).\n- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).\n- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).\n- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).\n- nfs_common: need lock during iterate through the list (for-next).\n- nfsd4: readdirplus shouldn\u0027t return parent of export (git-fixes).\n- nfsd: Fix message level for normal termination (for-next).\n- nvme-multipath: Early exit if no path is available (bsc#1180964).\n- nvme-multipath: fix bogus request queue reference put (bsc#1175389).\n- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).\n- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).\n- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).\n- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).\n- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).\n- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).\n- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).\n- power: vexpress: add suppress_bind_attrs to true (git-fixes).\n- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).\n- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).\n- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).\n- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).\n- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).\n- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).\n- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).\n- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).\n- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).\n- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).\n- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).\n- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).\n- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).\n- r8169: work around power-saving bug on some chip versions (git-fixes).\n- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).\n- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).\n- rtc: pl031: fix resource leak in pl031_probe (git-fixes).\n- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).\n- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).\n- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).\n- s390/dasd: fix list corruption of lcu list (git-fixes).\n- s390/dasd: fix list corruption of pavgroup group list (git-fixes).\n- s390/dasd: prevent inconsistent LCU device data (git-fixes).\n- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).\n- s390/qeth: consolidate online/offline code (git-fixes).\n- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).\n- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).\n- s390/qeth: fix deadlock during recovery (git-fixes).\n- s390/qeth: fix locking for discipline setup / removal (git-fixes).\n- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).\n- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).\n- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).\n- sched/fair: Check for idle core in wake_affine (git fixes (sched)).\n- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).\n- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).\n- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).\n- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).\n- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).\n- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).\n- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).\n- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).\n- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).\n- scsi: lpfc: Fix target reset failing (bsc#1180891).\n- scsi: lpfc: Fix vport create logging (bsc#1180891).\n- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).\n- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).\n- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).\n- scsi: lpfc: Simplify bool comparison (bsc#1180891).\n- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).\n- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).\n- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).\n- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).\n- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).\n- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).\n- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).\n- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).\n- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).\n- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).\n- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).\n- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).\n- selftests: net: fib_tests: remove duplicate log test (git-fixes).\n- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).\n- spi: cadence: cache reference clock rate during probe (git-fixes).\n- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).\n- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).\n- swiotlb: fix \u0027x86: Do not panic if can not alloc buffer for swiotlb\u0027 (git-fixes).\n- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).\n- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).\n- timers: Use only bucket expiry for base-\u003enext_expiry value (bsc#1181318).\n- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).\n- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).\n- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- usb: dwc3: core: Properly default unspecified speed (git-fixes).\n- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).\n- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).\n- usb: gadget: aspeed: fix stop dma register setting (git-fixes).\n- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).\n- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).\n- usb: gadget: enable super speed plus (git-fixes).\n- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).\n- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).\n- usb: gadget: select CONFIG_CRC32 (git-fixes).\n- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).\n- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).\n- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).\n- usb: udc: core: Use lock when write to soft_connect (git-fixes).\n- usb: usbip: vhci_hcd: protect shift size (git-fixes).\n- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).\n- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).\n- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).\n- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).\n- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).\n- video: fbdev: pvr2fb: initialize variables (git-fixes).\n- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).\n- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).\n- wext: fix NULL-ptr-dereference with cfg80211\u0027s lack of commit() (git-fixes).\n- wil6210: select CONFIG_CRC32 (git-fixes).\n- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).\n- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).\n- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).\n- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).\n- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).\n- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).\n- x86/mm: Fix leak of pmd ptlock (bsc#1152489).\n- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).\n- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).\n- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).\n- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).\n- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).\n- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).\n- xen/privcmd: allow fetching resource sizes (bsc#1065600).\n- xfs: show the proper user quota options (bsc#1181538).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).\n- xhci: tegra: Delay for disabling LFPS detector (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-427,SUSE-SLE-Module-RT-15-SP2-2021-427", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0427-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0427-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210427-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0427-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1163930", "url": "https://bugzilla.suse.com/1163930" }, { "category": "self", "summary": "SUSE Bug 1165545", "url": "https://bugzilla.suse.com/1165545" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1172355", "url": "https://bugzilla.suse.com/1172355" }, { "category": "self", "summary": "SUSE Bug 1175389", "url": "https://bugzilla.suse.com/1175389" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176831", "url": "https://bugzilla.suse.com/1176831" }, { "category": "self", "summary": "SUSE Bug 1176846", "url": "https://bugzilla.suse.com/1176846" }, { "category": "self", "summary": "SUSE Bug 1178142", "url": "https://bugzilla.suse.com/1178142" }, { "category": "self", "summary": "SUSE Bug 1178372", "url": "https://bugzilla.suse.com/1178372" }, { "category": "self", "summary": "SUSE Bug 1178631", "url": "https://bugzilla.suse.com/1178631" }, { "category": "self", "summary": "SUSE Bug 1178684", "url": "https://bugzilla.suse.com/1178684" }, { "category": "self", "summary": "SUSE Bug 1178995", "url": "https://bugzilla.suse.com/1178995" }, { "category": "self", "summary": "SUSE Bug 1179142", "url": "https://bugzilla.suse.com/1179142" }, { "category": "self", "summary": "SUSE Bug 1179396", "url": "https://bugzilla.suse.com/1179396" }, { "category": "self", "summary": "SUSE Bug 1179508", "url": "https://bugzilla.suse.com/1179508" }, { "category": "self", "summary": "SUSE Bug 1179509", "url": "https://bugzilla.suse.com/1179509" }, { "category": "self", "summary": "SUSE Bug 1179567", "url": "https://bugzilla.suse.com/1179567" }, { "category": "self", "summary": "SUSE Bug 1179572", "url": "https://bugzilla.suse.com/1179572" }, { "category": "self", "summary": "SUSE Bug 1179575", "url": "https://bugzilla.suse.com/1179575" }, { "category": "self", "summary": "SUSE Bug 1179878", "url": "https://bugzilla.suse.com/1179878" }, { "category": "self", "summary": "SUSE Bug 1180008", "url": "https://bugzilla.suse.com/1180008" }, { "category": "self", "summary": "SUSE Bug 1180130", "url": "https://bugzilla.suse.com/1180130" }, { "category": "self", "summary": "SUSE Bug 1180264", "url": "https://bugzilla.suse.com/1180264" }, { "category": "self", "summary": "SUSE Bug 1180412", "url": "https://bugzilla.suse.com/1180412" }, { "category": "self", "summary": "SUSE Bug 1180676", "url": "https://bugzilla.suse.com/1180676" }, { "category": "self", "summary": "SUSE Bug 1180759", "url": "https://bugzilla.suse.com/1180759" }, { "category": "self", "summary": "SUSE Bug 1180765", "url": "https://bugzilla.suse.com/1180765" }, { "category": "self", "summary": "SUSE Bug 1180773", "url": "https://bugzilla.suse.com/1180773" }, { "category": "self", "summary": "SUSE Bug 1180809", "url": "https://bugzilla.suse.com/1180809" }, { "category": "self", "summary": "SUSE Bug 1180812", "url": "https://bugzilla.suse.com/1180812" }, { "category": "self", "summary": "SUSE Bug 1180848", "url": "https://bugzilla.suse.com/1180848" }, { "category": "self", "summary": "SUSE Bug 1180859", "url": "https://bugzilla.suse.com/1180859" }, { "category": "self", "summary": "SUSE Bug 1180889", "url": "https://bugzilla.suse.com/1180889" }, { "category": "self", "summary": "SUSE Bug 1180891", "url": "https://bugzilla.suse.com/1180891" }, { "category": "self", "summary": "SUSE Bug 1180964", "url": "https://bugzilla.suse.com/1180964" }, { "category": "self", "summary": "SUSE Bug 1180971", "url": "https://bugzilla.suse.com/1180971" }, { "category": "self", "summary": "SUSE Bug 1181014", "url": "https://bugzilla.suse.com/1181014" }, { "category": "self", "summary": "SUSE Bug 1181018", "url": "https://bugzilla.suse.com/1181018" }, { "category": "self", "summary": "SUSE Bug 1181077", "url": "https://bugzilla.suse.com/1181077" }, { "category": "self", "summary": "SUSE Bug 1181104", "url": "https://bugzilla.suse.com/1181104" }, { "category": "self", "summary": "SUSE Bug 1181148", "url": "https://bugzilla.suse.com/1181148" }, { "category": "self", "summary": "SUSE Bug 1181158", "url": "https://bugzilla.suse.com/1181158" }, { "category": "self", "summary": "SUSE Bug 1181161", "url": "https://bugzilla.suse.com/1181161" }, { "category": "self", "summary": "SUSE Bug 1181169", "url": "https://bugzilla.suse.com/1181169" }, { "category": "self", "summary": "SUSE Bug 1181203", "url": "https://bugzilla.suse.com/1181203" }, { "category": "self", "summary": "SUSE Bug 1181217", "url": "https://bugzilla.suse.com/1181217" }, { "category": "self", "summary": "SUSE Bug 1181218", "url": "https://bugzilla.suse.com/1181218" }, { "category": "self", "summary": "SUSE Bug 1181219", "url": "https://bugzilla.suse.com/1181219" }, { "category": "self", "summary": "SUSE Bug 1181220", "url": "https://bugzilla.suse.com/1181220" }, { "category": "self", "summary": "SUSE Bug 1181237", "url": "https://bugzilla.suse.com/1181237" }, { "category": "self", "summary": "SUSE Bug 1181318", "url": "https://bugzilla.suse.com/1181318" }, { "category": "self", "summary": "SUSE Bug 1181335", "url": "https://bugzilla.suse.com/1181335" }, { "category": "self", "summary": "SUSE Bug 1181346", "url": "https://bugzilla.suse.com/1181346" }, { "category": "self", "summary": "SUSE Bug 1181349", "url": "https://bugzilla.suse.com/1181349" }, { "category": "self", "summary": "SUSE Bug 1181425", "url": "https://bugzilla.suse.com/1181425" }, { "category": "self", "summary": "SUSE Bug 1181494", "url": "https://bugzilla.suse.com/1181494" }, { "category": "self", "summary": "SUSE Bug 1181504", "url": "https://bugzilla.suse.com/1181504" }, { "category": "self", "summary": "SUSE Bug 1181511", "url": "https://bugzilla.suse.com/1181511" }, { "category": "self", "summary": "SUSE Bug 1181538", "url": "https://bugzilla.suse.com/1181538" }, { "category": "self", "summary": "SUSE Bug 1181544", "url": "https://bugzilla.suse.com/1181544" }, { "category": "self", "summary": "SUSE Bug 1181553", "url": "https://bugzilla.suse.com/1181553" }, { "category": "self", "summary": "SUSE Bug 1181584", "url": "https://bugzilla.suse.com/1181584" }, { "category": "self", "summary": "SUSE Bug 1181645", "url": "https://bugzilla.suse.com/1181645" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25211 page", "url": "https://www.suse.com/security/cve/CVE-2020-25211/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27835 page", "url": "https://www.suse.com/security/cve/CVE-2020-27835/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28374 page", "url": "https://www.suse.com/security/cve/CVE-2020-28374/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29568 page", "url": "https://www.suse.com/security/cve/CVE-2020-29568/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29569 page", "url": "https://www.suse.com/security/cve/CVE-2020-29569/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0342 page", "url": "https://www.suse.com/security/cve/CVE-2021-0342/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20177 page", "url": "https://www.suse.com/security/cve/CVE-2021-20177/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3347 page", "url": "https://www.suse.com/security/cve/CVE-2021-3347/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3348 page", "url": "https://www.suse.com/security/cve/CVE-2021-3348/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-02-10T15:45:51Z", "generator": { "date": "2021-02-10T15:45:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0427-1", "initial_release_date": "2021-02-10T15:45:51Z", "revision_history": [ { "date": "2021-02-10T15:45:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-25.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-25.1.noarch", "product_id": "kernel-devel-rt-5.3.18-25.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-25.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-25.1.noarch", "product_id": "kernel-source-rt-5.3.18-25.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-25.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-25.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-25.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-25.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-25.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-25.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-25.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-25.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-25.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-25.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-25.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-25.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-25.1.x86_64", "product": { "name": "kernel-rt-5.3.18-25.1.x86_64", "product_id": "kernel-rt-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-25.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-25.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-25.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-25.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-25.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-25.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-25.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-25.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-25.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-25.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-25.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-25.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-25.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-25.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-25.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-25.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-25.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-25.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-25.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-25.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-25.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-25.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-25.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-25.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-25.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-25.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-25.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-25.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-25.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-25.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP2", "product": { "name": "SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-25.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-25.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-25.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-25.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-25.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-25.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-25.1.noarch as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-25.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-25.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-25.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-25.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-25.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-25.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-25.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-25.1.noarch as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-25.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-25.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-25.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-25.1.x86_64 as component of SUSE Real Time Module 15 SP2", "product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-25.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25211" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25211", "url": "https://www.suse.com/security/cve/CVE-2020-25211" }, { "category": "external", "summary": "SUSE Bug 1176395 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1176395" }, { "category": "external", "summary": "SUSE Bug 1192356 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1192356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-10T15:45:51Z", "details": "moderate" } ], "title": "CVE-2020-25211" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-10T15:45:51Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-27835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27835" } ], "notes": [ { "category": "general", "text": "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27835", "url": "https://www.suse.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "SUSE Bug 1179878 for CVE-2020-27835", "url": "https://bugzilla.suse.com/1179878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-10T15:45:51Z", "details": "moderate" } ], "title": "CVE-2020-27835" }, { "cve": "CVE-2020-28374", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28374" } ], "notes": [ { "category": "general", "text": "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28374", "url": "https://www.suse.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "SUSE Bug 1178372 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1178372" }, { "category": "external", "summary": "SUSE Bug 1178684 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1178684" }, { "category": "external", "summary": "SUSE Bug 1180676 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1180676" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-10T15:45:51Z", "details": "important" } ], "title": "CVE-2020-28374" }, { "cve": "CVE-2020-29568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29568" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29568", "url": "https://www.suse.com/security/cve/CVE-2020-29568" }, { "category": "external", "summary": "SUSE Bug 1179508 for CVE-2020-29568", "url": "https://bugzilla.suse.com/1179508" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-10T15:45:51Z", "details": "moderate" } ], "title": "CVE-2020-29568" }, { "cve": "CVE-2020-29569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29569" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29569", "url": "https://www.suse.com/security/cve/CVE-2020-29569" }, { "category": "external", "summary": "SUSE Bug 1179509 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1179509" }, { "category": "external", "summary": "SUSE Bug 1180008 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1180008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-10T15:45:51Z", "details": "important" } ], "title": "CVE-2020-29569" }, { "cve": "CVE-2021-0342", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0342" } ], "notes": [ { "category": "general", "text": "In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0342", "url": "https://www.suse.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "SUSE Bug 1180812 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180812" }, { "category": "external", "summary": "SUSE Bug 1180859 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-10T15:45:51Z", "details": "important" } ], "title": "CVE-2021-0342" }, { "cve": "CVE-2021-20177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20177" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20177", "url": "https://www.suse.com/security/cve/CVE-2021-20177" }, { "category": "external", "summary": "SUSE Bug 1180765 for CVE-2021-20177", "url": "https://bugzilla.suse.com/1180765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-10T15:45:51Z", "details": "moderate" } ], "title": "CVE-2021-20177" }, { "cve": "CVE-2021-3347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3347" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3347", "url": "https://www.suse.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "SUSE Bug 1181349 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181349" }, { "category": "external", "summary": "SUSE Bug 1181553 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181553" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-10T15:45:51Z", "details": "important" } ], "title": "CVE-2021-3347" }, { "cve": "CVE-2021-3348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3348" } ], "notes": [ { "category": "general", "text": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3348", "url": "https://www.suse.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "SUSE Bug 1181504 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181504" }, { "category": "external", "summary": "SUSE Bug 1181645 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-25.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-25.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-10T15:45:51Z", "details": "moderate" } ], "title": "CVE-2021-3348" } ] }
suse-su-2021:0433-1
Vulnerability from csaf_suse
Published
2021-02-11 08:19
Modified
2021-02-11 08:19
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
The following non-security bugs were fixed:
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: timer: Limit max amount of slave instances (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- ASoC: Intel: haswell: Add missing pm_ops (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).
- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).
- ASoC: sti: fix possible sleep-in-atomic (git-fixes).
- ASoC: wm8904: fix regcache handling (git-fixes).
- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).
- Bluetooth: Fix advertising duplicated flags (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- EDAC/amd64: Fix PCI component registration (bsc#1112178).
- HID: Improve Windows Precision Touchpad detection (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).
- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (bsc#1103991).
- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180912).
- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (git-fixes).
- NFS: nfs_igrab_and_active must first reference the superblock (git-fixes).
- NFS: switch nfsiod to be an UNBOUND workqueue (git-fixes).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).
- PM: ACPI: Output correct message on target power state (git-fixes).
- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1103992).
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1050244 ).
- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1104742).
- RDMA/cma: Do not overwrite sgid_attr after device is released (bsc#1103992).
- RDMA/core: Ensure security pkey modify is not lost (bsc#1046306 ).
- RDMA/core: Fix pkey and port assignment in get_new_pps (bsc#1046306).
- RDMA/core: Fix protection fault in get_pkey_idx_qp_list (bsc#1046306).
- RDMA/core: Fix reported speed and width (bsc#1046306 ).
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1103992).
- RDMA/core: Fix use of logical OR in get_new_pps (bsc#1046306 ).
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1104427).
- RDMA/hns: Bugfix for slab-out-of-bounds when unloading hip08 driver (bsc#1104427).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (bsc#1104427 bsc#1126206).
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1104427 ).
- RDMA/hns: bugfix for slab-out-of-bounds when loading hip08 driver (bsc#1104427).
- RDMA/iw_cxgb4: Fix incorrect function parameters (bsc#1136348 jsc#SLE-4684).
- RDMA/iw_cxgb4: initiate CLOSE when entering TERM (bsc#1136348 jsc#SLE-4684).
- RDMA/mlx5: Add init2init as a modify command (bsc#1103991 ).
- RDMA/mlx5: Fix typo in enum name (bsc#1103991).
- RDMA/mlx5: Fix wrong free of blue flame register on error (bsc#1103991).
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1050545 ).
- SUNRPC: cache: ignore timestamp written to 'flush' file (bsc#1178036).
- USB: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).
- USB: Skip endpoints with 0 maxpacket length (git-fixes).
- USB: UAS: introduce a quirk to set no_write_same (git-fixes).
- USB: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- USB: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- USB: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- USB: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- USB: ldusb: use unsigned size format specifiers (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- __netif_receive_skb_core: pass skb by reference (bsc#1109837).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: fix backtrace on coredump (git-fixes).
- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).
- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).
- ath9k_htc: Discard undersized packets (git-fixes).
- ath9k_htc: Modify byte order for an error message (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- bnxt_en: Do not query FW when netif_running() is false (bsc#1086282).
- bnxt_en: Fix accumulation of bp->net_stats_prev (bsc#1104745 ).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (bsc#1104745).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bnxt_en: Reset rings if ring reservation fails during open() (bsc#1086282).
- bnxt_en: fix HWRM error when querying VF temperature (bsc#1104745).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (bsc#1050242 ).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: return proper error codes in bnxt_show_temp (bsc#1104745).
- bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).
- btrfs: add a flag to iterate_inodes_from_logical to find all
- btrfs: add a flag to iterate_inodes_from_logical to find all extent refs for uncompressed extents (bsc#1174206).
- btrfs: add a flag to iterate_inodes_from_logical to find all extent refs for uncompressed extents (bsc#1174206).
- btrfs: add a flags argument to LOGICAL_INO and call it LOGICAL_INO_V2 (bsc#1174206).
- btrfs: increase output size for LOGICAL_INO_V2 ioctl (bsc#1174206).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- chelsio/chtls: correct function return and return type (bsc#1104270).
- chelsio/chtls: correct netdevice for vlan interface (bsc#1104270 ).
- chelsio/chtls: fix a double free in chtls_setkey() (bsc#1104270 ).
- chelsio/chtls: fix always leaking ctrl_skb (bsc#1104270 ).
- chelsio/chtls: fix deadlock issue (bsc#1104270).
- chelsio/chtls: fix memory leaks caused by a race (bsc#1104270 ).
- chelsio/chtls: fix memory leaks in CPL handlers (bsc#1104270 ).
- chelsio/chtls: fix panic during unload reload chtls (bsc#1104270 ).
- chelsio/chtls: fix socket lock (bsc#1104270).
- chelsio/chtls: fix tls record info to user (bsc#1104270 ).
- chtls: Added a check to avoid NULL pointer dereference (bsc#1104270).
- chtls: Fix chtls resources release sequence (bsc#1104270 ).
- chtls: Fix hardware tid leak (bsc#1104270).
- chtls: Remove invalid set_tcb call (bsc#1104270).
- chtls: Replace skb_dequeue with skb_peek (bsc#1104270 ).
- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).
- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).
- cpumap: Avoid warning when CONFIG_DEBUG_PER_CPU_MAPS is enabled (bsc#1109837).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4/cxgb4vf: fix flow control display for auto negotiation (bsc#1046540 bsc#1046542).
- cxgb4: fix SGE queue dump destination buffer context (bsc#1073513).
- cxgb4: fix adapter crash due to wrong MC size (bsc#1073513).
- cxgb4: fix all-mask IP address comparison (bsc#1064802 bsc#1066129).
- cxgb4: fix large delays in PTP synchronization (bsc#1046540 bsc#1046648).
- cxgb4: fix the panic caused by non smac rewrite (bsc#1064802 bsc#1066129).
- cxgb4: fix thermal zone device registration (bsc#1104279 bsc#1104277).
- cxgb4: fix throughput drop during Tx backpressure (bsc#1127354 bsc#1127371).
- cxgb4: move DCB version extern to header file (bsc#1104279 ).
- cxgb4: remove cast when saving IPv4 partial checksum (bsc#1074220).
- cxgb4: set up filter action after rewrites (bsc#1064802 bsc#1066129).
- cxgb4: use correct type for all-mask IP address comparison (bsc#1064802 bsc#1066129).
- cxgb4: use unaligned conversion for fetching timestamp (bsc#1046540 bsc#1046648).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- docs: Fix reST markup when linking to sections (git-fixes).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1113956)
- drm/amdkfd: Put ACPI table after using it (bsc#1129770) Backporting changes: * context changes
- drm/atomic: put state on error path (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#1129770)
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: Clear the repeater bit on HDCP disable (bsc#1112178) Backporting changes: * context changes
- drm/i915: Fix sha_text population code (bsc#1112178) Backporting changes: * context changes
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1129770) Backporting changes: * context changes * moved num_mixers from struct dpu_crtc_state to struct dpu_crtc
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1129770) Backporting changes: * context changes
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1129770) Backporting changes: * context changes * removed reference to msm_gem_is_locked()
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1129770)
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1112178) Backporting changes: * context changes
- drm: sun4i: hdmi: Fix inverted HPD result (bsc#1112178) Backporting changes: * context changes
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1112178)
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178) Backporting changes: * updated path drivers/video/fbcon/core to drivers/video/console
- fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: * updated path drivers/video/fbcon/core to drivers/video/console * context changes
- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).
- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).
- gpio: max77620: Fixup debounce delays (git-fixes).
- gpio: max77620: Use correct unit for debounce times (git-fixes).
- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).
- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).
- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).
- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).
- gpiolib: fix up emulated open drain outputs (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: avoid premature Rx buffer reuse (bsc#1111981).
- igb: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: fix link speed advertising (jsc#SLE-4799).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iio: adc: max1027: Reset the device at probe time (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio: fix center temperature of bmc150-accel-core (git-fixes).
- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).
- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).
- iio: srf04: fix wrong limitation in distance measuring (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191).
- ipw2x00: Fix -Wcast-function-type (git-fixes).
- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (bsc#1109837).
- ixgbe: avoid premature Rx buffer reuse (bsc#1109837 ).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).
- lockd: do not use interval-based rebinding over TCP (git-fixes).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).
- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: fix authentication with iwlwifi/mvm (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- md/raid10: initialize r10_bio->read_slot before use (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (git-fixes).
- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).
- media: cec-funcs.h: add status_req checks (git-fixes).
- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).
- media: i2c: ov2659: Fix missing 720p register config (git-fixes).
- media: i2c: ov2659: fix s_stream return value (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).
- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).
- media: si470x-i2c: add missed operations in remove (git-fixes).
- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).
- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).
- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).
- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (bsc#1112374).
- mlxsw: spectrum: Do not modify cloned SKBs during xmit (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (bsc#1112374).
- mlxsw: switchx2: Do not modify cloned SKBs during xmit (git-fixes).
- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/hotplug)).
- mm/page_alloc: fix watchdog soft lockups during set_zone_contiguous() (git fixes (mm/pgalloc)).
- mm/rmap: map_pte() was not handling private ZONE_DEVICE page properly (git fixes (mm/hmm)).
- mm/slab: use memzero_explicit() in kzfree() (git fixes (mm/slab)).
- mm: do not wake kswapd prematurely when watermark boosting is disabled (git fixes (mm/vmscan)).
- mm: hwpoison: disable memory error handling on 1GB hugepage (git fixes (mm/hwpoison)).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- module: delay kobject uevent until after module init call (bsc#1178631).
- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).
- net/af_iucv: always register net_device notifier (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179563 LTC#190108).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net/filter: Permit reading NET in load_bytes_relative when MAC not set (bsc#1109837).
- net/liquidio: Delete driver version assignment (git-fixes).
- net/liquidio: Delete non-working LIQUIDIO_PACKAGE check (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (git-fixes).
- net/mlx5: Add handling of port type in rule deletion (bsc#1103991).
- net/mlx5: Fix memory leak on flow table creation error flow (bsc#1046305).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (bsc#1046305).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (bsc#1075020).
- net/mlx5e: TX, Fix consumer index of error cqe dump (bsc#1103990 ).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (bsc#1103990).
- net/sched: act_tunnel_key: fix OOB write in case of IPv6 ERSPAN tunnels (bsc#1109837).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: receive pending data after RCV_SHUTDOWN (git-fixes).
- net/smc: receive returns without data (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: reapply manual settings to the PHY (git-fixes).
- net: broadcom/bcmsysport: Fix signedness in bcm_sysport_probe() (git-fixes).
- net: cbs: Fix software cbs to consider packet sending time (bsc#1109837).
- net: dsa: LAN9303: select REGMAP when LAN9303 enable (git-fixes).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: stmmac: Fix signedness bug in ipq806x_gmac_of_parse() (git-fixes).
- net: freescale: fec: Fix ethtool -d runtime PM (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (bsc#1104353).
- net: hns3: add compatible handling for command HCLGE_OPC_PF_RST_DONE (git-fixes).
- net: hns3: add management table after IMP reset (bsc#1104353 ).
- net: hns3: check reset interrupt status when reset fails (git-fixes).
- net: hns3: clear reset interrupt status in hclge_irq_handle() (git-fixes).
- net: hns3: fix a TX timeout issue (bsc#1104353).
- net: hns3: fix a wrong reset interrupt status mask (git-fixes).
- net: hns3: fix error VF index when setting VLAN offload (bsc#1104353).
- net: hns3: fix error handling for desc filling (bsc#1104353 ).
- net: hns3: fix for not calculating TX BD send size correctly (bsc#1126390).
- net: hns3: fix interrupt clearing error for VF (bsc#1104353 ).
- net: hns3: fix mis-counting IRQ vector numbers issue (bsc#1104353).
- net: hns3: fix shaper parameter algorithm (bsc#1104353 ).
- net: hns3: fix the number of queues actually used by ARQ (bsc#1104353).
- net: hns3: fix use-after-free when doing self test (bsc#1104353 ).
- net: hns3: reallocate SSU' buffer size when pfc_en changes (bsc#1104353).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (bsc#1098633).
- net: mvpp2: Fix error return code in mvpp2_open() (bsc#1119113 ).
- net: mvpp2: fix pkt coalescing int-threshold configuration (bsc#1098633).
- net: phy: Allow BCM54616S PHY to setup internal TX/RX clock delay (git-fixes).
- net: phy: Avoid multiple suspends (git-fixes).
- net: phy: broadcom: Fix RGMII delays configuration for BCM54210E (git-fixes).
- net: phy: micrel: Discern KSZ8051 and KSZ8795 PHYs (git-fixes).
- net: phy: micrel: make sure the factory test bit is cleared (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: dwmac-meson8b: Fix signedness bug in probe (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: gmac4+: Not all Unicast addresses may be available (git-fixes).
- net: sunrpc: interpret the return value of kstrtou32 correctly (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- net: usb: lan78xx: Fix error message format specifier (git-fixes).
- net: usb: sr9800: fix uninitialized local variable (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (git-fixes).
- net_failover: fixed rollback in net_failover_open() (bsc#1109837).
- net_sched: let qdisc_put() accept NULL pointer (bsc#1056657 bsc#1056653 bsc#1056787).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- nfp: validate the return code from dev_queue_xmit() (git-fixes).
- nfs_common: need lock during iterate through the list (git-fixes).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- page_frag: Recover from memory pressure (git fixes (mm/pgalloc)).
- parport: load lowlevel driver if ports not found (git-fixes).
- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).
- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).
- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).
- powerpc/perf: Add generic compat mode pmu driver (bsc#1178900 ltc#189284).
- powerpc/perf: Fix crashes with generic_compat_pmu & BHRB (bsc#1178900 ltc#189284 git-fixes).
- powerpc/perf: init pmu from core-book3s (bsc#1178900 ltc#189284).
- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix use after free in qed_chain_free (bsc#1050536 bsc#1050538).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).
- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).
- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).
- remoteproc: Fix wrong rvring index computation (git-fixes).
- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).
- rtc: 88pm860x: fix possible race condition (git-fixes).
- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).
- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1144912).
- s390/dasd: fix list corruption of lcu list (bsc#1181170 LTC#190915).
- s390/dasd: fix list corruption of pavgroup group list (bsc#1181170 LTC#190915).
- s390/dasd: prevent inconsistent LCU device data (bsc#1181170 LTC#190915).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Fix enqueue_task_fair warning (bsc#1179093).
- sched/fair: Fix enqueue_task_fair() warning some more (bsc#1179093).
- sched/fair: Fix reordering of enqueue/dequeue_task_fair() (bsc#1179093).
- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (bsc#1179093).
- sched/fair: Reorder enqueue/dequeue_task_fair path (bsc#1179093).
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049, git-fixes).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- soc: imx: gpc: fix power up sequencing (git-fixes).
- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: img-spfi: fix potential double release (git-fixes).
- spi: pxa2xx: Add missed security checks (git-fixes).
- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).
- spi: tegra20-slink: add missed clk_unprepare (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).
- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).
- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).
- staging: rtl8188eu: fix possible null dereference (git-fixes).
- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).
- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- team: set dev->needed_headroom in team_setup_by_port() (git-fixes).
- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).
- tty: always relink the port (git-fixes).
- tty: link tty and port before configuring it as console (git-fixes).
- tty: synclink_gt: Adjust indentation in several functions (git-fixes).
- tty: synclinkmp: Adjust indentation in several functions (git-fixes).
- tty:serial:mvebu-uart:fix a wrong return (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (bsc#1109837).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- usb: dwc2: Fix IN FIFO allocation (git-fixes).
- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: fsl: Check memory resource before releasing it (git-fixes).
- usb: gadget: composite: Fix possible double free memory bug (git-fixes).
- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).
- usb: gadget: fix wrong endpoint desc (git-fixes).
- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).
- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (bsc#1109837).
- vfio iommu: Add dma available capability (bsc#1179573 LTC#190106).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181231).
- vhost/vsock: fix vhost vsock cid hashing inconsistent (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- vt: Reject zero-sized screen buffer size (git-fixes).
- vt: do not hardcode the mem allocation upper bound (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: da9062: do not ping the hw during stop() (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/i8259: Use printk_deferred() to prevent deadlock (bsc#1112178).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1112178).
- x86/mm: Fix leak of pmd ptlock (bsc#1112178).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1112178).
- x86/resctrl: Do not move a task to the same resource group (bsc#1112178).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1112178).
- xdp: Fix xsk_generic_xmit errno (bsc#1109837).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
Patchnames
SUSE-2021-433,SUSE-SLE-RT-12-SP5-2021-433
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).\n- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).\n- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)\n- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n\nThe following non-security bugs were fixed:\n\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).\n- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).\n- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).\n- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).\n- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).\n- ALSA: ca0106: fix error code handling (git-fixes).\n- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).\n- ALSA: doc: Fix reference to mixart.rst (git-fixes).\n- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).\n- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).\n- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).\n- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).\n- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).\n- ALSA: hda/realtek - Couldn\u0027t detect Mic if booting with headset plugged (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).\n- ALSA: hda/via: Add minimum mute flag (git-fixes).\n- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).\n- ALSA: hda: Add NVIDIA codec IDs 9a \u0026 9d through a0 to patch table (git-fixes).\n- ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).\n- ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).\n- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).\n- ALSA: timer: Limit max amount of slave instances (git-fixes).\n- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).\n- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).\n- ALSA: usb-audio: Fix control \u0027access overflow\u0027 errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).\n- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).\n- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).\n- ASoC: Intel: haswell: Add missing pm_ops (git-fixes).\n- ASoC: dapm: remove widget from dirty list on free (git-fixes).\n- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).\n- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).\n- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).\n- ASoC: sti: fix possible sleep-in-atomic (git-fixes).\n- ASoC: wm8904: fix regcache handling (git-fixes).\n- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).\n- Bluetooth: Fix advertising duplicated flags (git-fixes).\n- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).\n- EDAC/amd64: Fix PCI component registration (bsc#1112178).\n- HID: Improve Windows Precision Touchpad detection (git-fixes).\n- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n- HID: core: Correctly handle ReportSize being zero (git-fixes).\n- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).\n- HID: cypress: Support Varmilo Keyboards\u0027 media hotkeys (git-fixes).\n- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).\n- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).\n- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).\n- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (bsc#1103991).\n- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send \u0027scancodes\u0027 in addition to key events (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).\n- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180912).\n- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).\n- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (git-fixes).\n- NFS: nfs_igrab_and_active must first reference the superblock (git-fixes).\n- NFS: switch nfsiod to be an UNBOUND workqueue (git-fixes).\n- NFSv4.2: condition READDIR\u0027s mask for security label based on LSM state (git-fixes).\n- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).\n- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).\n- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).\n- PM: ACPI: Output correct message on target power state (git-fixes).\n- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1103992).\n- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1050244 ).\n- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1104742).\n- RDMA/cma: Do not overwrite sgid_attr after device is released (bsc#1103992).\n- RDMA/core: Ensure security pkey modify is not lost (bsc#1046306 ).\n- RDMA/core: Fix pkey and port assignment in get_new_pps (bsc#1046306).\n- RDMA/core: Fix protection fault in get_pkey_idx_qp_list (bsc#1046306).\n- RDMA/core: Fix reported speed and width (bsc#1046306 ).\n- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1103992).\n- RDMA/core: Fix use of logical OR in get_new_pps (bsc#1046306 ).\n- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1104427).\n- RDMA/hns: Bugfix for slab-out-of-bounds when unloading hip08 driver (bsc#1104427).\n- RDMA/hns: Fix cmdq parameter of querying pf timer resource (bsc#1104427 bsc#1126206).\n- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1104427 ).\n- RDMA/hns: bugfix for slab-out-of-bounds when loading hip08 driver (bsc#1104427).\n- RDMA/iw_cxgb4: Fix incorrect function parameters (bsc#1136348 jsc#SLE-4684).\n- RDMA/iw_cxgb4: initiate CLOSE when entering TERM (bsc#1136348 jsc#SLE-4684).\n- RDMA/mlx5: Add init2init as a modify command (bsc#1103991 ).\n- RDMA/mlx5: Fix typo in enum name (bsc#1103991).\n- RDMA/mlx5: Fix wrong free of blue flame register on error (bsc#1103991).\n- RDMA/qedr: Fix inline size returned for iWARP (bsc#1050545 ).\n- SUNRPC: cache: ignore timestamp written to \u0027flush\u0027 file (bsc#1178036).\n- USB: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).\n- USB: Skip endpoints with 0 maxpacket length (git-fixes).\n- USB: UAS: introduce a quirk to set no_write_same (git-fixes).\n- USB: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- USB: ehci: fix an interrupt calltrace error (git-fixes).\n- USB: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- USB: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- USB: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).\n- USB: ldusb: use unsigned size format specifiers (git-fixes).\n- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).\n- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).\n- USB: yurex: fix control-URB timeout handling (git-fixes).\n- __netif_receive_skb_core: pass skb by reference (bsc#1109837).\n- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).\n- arm64: pgtable: Fix pte_accessible() (bsc#1180130).\n- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).\n- ath10k: fix backtrace on coredump (git-fixes).\n- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).\n- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).\n- ath9k_htc: Discard undersized packets (git-fixes).\n- ath9k_htc: Modify byte order for an error message (git-fixes).\n- ath9k_htc: Silence undersized packet warnings (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).\n- bnxt_en: Do not query FW when netif_running() is false (bsc#1086282).\n- bnxt_en: Fix accumulation of bp-\u003enet_stats_prev (bsc#1104745 ).\n- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (bsc#1104745).\n- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).\n- bnxt_en: Reset rings if ring reservation fails during open() (bsc#1086282).\n- bnxt_en: fix HWRM error when querying VF temperature (bsc#1104745).\n- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).\n- bnxt_en: fix error return code in bnxt_init_one() (bsc#1050242 ).\n- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).\n- bnxt_en: return proper error codes in bnxt_show_temp (bsc#1104745).\n- bonding: set dev-\u003eneeded_headroom in bond_setup_by_slave() (git-fixes).\n- btrfs: add a flag to iterate_inodes_from_logical to find all\n- btrfs: add a flag to iterate_inodes_from_logical to find all extent refs for uncompressed extents (bsc#1174206).\n- btrfs: add a flag to iterate_inodes_from_logical to find all extent refs for uncompressed extents (bsc#1174206).\n- btrfs: add a flags argument to LOGICAL_INO and call it LOGICAL_INO_V2 (bsc#1174206).\n- btrfs: increase output size for LOGICAL_INO_V2 ioctl (bsc#1174206).\n- btrfs: qgroup: do not try to wait flushing if we\u0027re already holding a transaction (bsc#1179575).\n- caif: no need to check return value of debugfs_create functions (git-fixes).\n- can: c_can: c_can_power_up(): fix error handling (git-fixes).\n- can: dev: prevent potential information leak in can_fill_info() (git-fixes).\n- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).\n- chelsio/chtls: correct function return and return type (bsc#1104270).\n- chelsio/chtls: correct netdevice for vlan interface (bsc#1104270 ).\n- chelsio/chtls: fix a double free in chtls_setkey() (bsc#1104270 ).\n- chelsio/chtls: fix always leaking ctrl_skb (bsc#1104270 ).\n- chelsio/chtls: fix deadlock issue (bsc#1104270).\n- chelsio/chtls: fix memory leaks caused by a race (bsc#1104270 ).\n- chelsio/chtls: fix memory leaks in CPL handlers (bsc#1104270 ).\n- chelsio/chtls: fix panic during unload reload chtls (bsc#1104270 ).\n- chelsio/chtls: fix socket lock (bsc#1104270).\n- chelsio/chtls: fix tls record info to user (bsc#1104270 ).\n- chtls: Added a check to avoid NULL pointer dereference (bsc#1104270).\n- chtls: Fix chtls resources release sequence (bsc#1104270 ).\n- chtls: Fix hardware tid leak (bsc#1104270).\n- chtls: Remove invalid set_tcb call (bsc#1104270).\n- chtls: Replace skb_dequeue with skb_peek (bsc#1104270 ).\n- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).\n- clk: qcom: msm8916: Fix the address location of pll-\u003econfig_reg (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clk: ti: composite: fix memory leak (git-fixes).\n- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).\n- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).\n- cpumap: Avoid warning when CONFIG_DEBUG_PER_CPU_MAPS is enabled (bsc#1109837).\n- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).\n- cxgb4/cxgb4vf: fix flow control display for auto negotiation (bsc#1046540 bsc#1046542).\n- cxgb4: fix SGE queue dump destination buffer context (bsc#1073513).\n- cxgb4: fix adapter crash due to wrong MC size (bsc#1073513).\n- cxgb4: fix all-mask IP address comparison (bsc#1064802 bsc#1066129).\n- cxgb4: fix large delays in PTP synchronization (bsc#1046540 bsc#1046648).\n- cxgb4: fix the panic caused by non smac rewrite (bsc#1064802 bsc#1066129).\n- cxgb4: fix thermal zone device registration (bsc#1104279 bsc#1104277).\n- cxgb4: fix throughput drop during Tx backpressure (bsc#1127354 bsc#1127371).\n- cxgb4: move DCB version extern to header file (bsc#1104279 ).\n- cxgb4: remove cast when saving IPv4 partial checksum (bsc#1074220).\n- cxgb4: set up filter action after rewrites (bsc#1064802 bsc#1066129).\n- cxgb4: use correct type for all-mask IP address comparison (bsc#1064802 bsc#1066129).\n- cxgb4: use unaligned conversion for fetching timestamp (bsc#1046540 bsc#1046648).\n- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).\n- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).\n- docs: Fix reST markup when linking to sections (git-fixes).\n- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).\n- drivers: net: xgene: Fix the order of the arguments of \u0027alloc_etherdev_mqs()\u0027 (git-fixes).\n- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1113956)\n- drm/amdkfd: Put ACPI table after using it (bsc#1129770) Backporting changes: \t* context changes\n- drm/atomic: put state on error path (git-fixes).\n- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#1129770)\n- drm/i915: Check for all subplatform bits (git-fixes).\n- drm/i915: Clear the repeater bit on HDCP disable (bsc#1112178) Backporting changes: \t* context changes\n- drm/i915: Fix sha_text population code (bsc#1112178) Backporting changes: \t* context changes\n- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1129770) Backporting changes: \t* context changes \t* moved num_mixers from struct dpu_crtc_state to struct dpu_crtc\n- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1129770) Backporting changes: \t * context changes\n- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1129770) Backporting changes: \t* context changes \t* removed reference to msm_gem_is_locked()\n- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).\n- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).\n- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).\n- drm/tve200: Fix handling of platform_get_irq() error (bsc#1129770)\n- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1112178) Backporting changes: \t* context changes\n- drm: sun4i: hdmi: Fix inverted HPD result (bsc#1112178) Backporting changes: \t* context changes\n- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1112178)\n- ehci: fix EHCI host controller initialization sequence (git-fixes).\n- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).\n- fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178) Backporting changes: \t* updated path drivers/video/fbcon/core to drivers/video/console\n- fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: \t* updated path drivers/video/fbcon/core to drivers/video/console \t* context changes\n- firmware: qcom: scm: Ensure \u0027a0\u0027 status code is treated as signed (git-fixes).\n- floppy: reintroduce O_NDELAY fix (boo#1181018).\n- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).\n- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).\n- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).\n- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).\n- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).\n- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).\n- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).\n- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).\n- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).\n- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).\n- gpio: max77620: Fixup debounce delays (git-fixes).\n- gpio: max77620: Use correct unit for debounce times (git-fixes).\n- gpio: mpc8xxx: Add platform device to gpiochip-\u003eparent (git-fixes).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).\n- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).\n- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).\n- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).\n- gpiolib: fix up emulated open drain outputs (git-fixes).\n- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).\n- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).\n- i2c: i801: Fix resume bug (git-fixes).\n- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).\n- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).\n- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).\n- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).\n- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).\n- i40e: avoid premature Rx buffer reuse (bsc#1111981).\n- igb: Report speed and duplex as unknown when device is runtime suspended (git-fixes).\n- igc: fix link speed advertising (jsc#SLE-4799).\n- iio: ad5504: Fix setting power-down state (git-fixes).\n- iio: adc: max1027: Reset the device at probe time (git-fixes).\n- iio: bmp280: fix compensation of humidity (git-fixes).\n- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).\n- iio: fix center temperature of bmc150-accel-core (git-fixes).\n- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).\n- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).\n- iio: srf04: fix wrong limitation in distance measuring (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191).\n- ipw2x00: Fix -Wcast-function-type (git-fixes).\n- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (bsc#1109837).\n- ixgbe: avoid premature Rx buffer reuse (bsc#1109837 ).\n- kABI workaround for HD-audio generic parser (git-fixes).\n- kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).\n- lockd: do not use interval-based rebinding over TCP (git-fixes).\n- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).\n- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).\n- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n- mac80211: fix authentication with iwlwifi/mvm (git-fixes).\n- mac80211: fix use of skb payload instead of header (git-fixes).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- md/raid10: initialize r10_bio-\u003eread_slot before use (git-fixes).\n- md: fix a warning caused by a race between concurrent md_ioctl()s (git-fixes).\n- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).\n- media: cec-funcs.h: add status_req checks (git-fixes).\n- media: cx88: Fix some error handling path in \u0027cx8800_initdev()\u0027 (git-fixes).\n- media: gp8psk: initialize stats at power control logic (git-fixes).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).\n- media: i2c: ov2659: Fix missing 720p register config (git-fixes).\n- media: i2c: ov2659: fix s_stream return value (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).\n- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).\n- media: si470x-i2c: add missed operations in remove (git-fixes).\n- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).\n- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).\n- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).\n- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).\n- mei: bus: do not clean driver pointer (git-fixes).\n- mei: protect mei_cl_mtu from null dereference (git-fixes).\n- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).\n- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).\n- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).\n- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).\n- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (bsc#1112374).\n- mlxsw: spectrum: Do not modify cloned SKBs during xmit (git-fixes).\n- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (bsc#1112374).\n- mlxsw: switchx2: Do not modify cloned SKBs during xmit (git-fixes).\n- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/hotplug)).\n- mm/page_alloc: fix watchdog soft lockups during set_zone_contiguous() (git fixes (mm/pgalloc)).\n- mm/rmap: map_pte() was not handling private ZONE_DEVICE page properly (git fixes (mm/hmm)).\n- mm/slab: use memzero_explicit() in kzfree() (git fixes (mm/slab)).\n- mm: do not wake kswapd prematurely when watermark boosting is disabled (git fixes (mm/vmscan)).\n- mm: hwpoison: disable memory error handling on 1GB hugepage (git fixes (mm/hwpoison)).\n- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).\n- module: delay kobject uevent until after module init call (bsc#1178631).\n- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).\n- net/af_iucv: always register net_device notifier (git-fixes).\n- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179563 LTC#190108).\n- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).\n- net/filter: Permit reading NET in load_bytes_relative when MAC not set (bsc#1109837).\n- net/liquidio: Delete driver version assignment (git-fixes).\n- net/liquidio: Delete non-working LIQUIDIO_PACKAGE check (git-fixes).\n- net/mlx4_en: Avoid scheduling restart task if it is already running (git-fixes).\n- net/mlx5: Add handling of port type in rule deletion (bsc#1103991).\n- net/mlx5: Fix memory leak on flow table creation error flow (bsc#1046305).\n- net/mlx5e: Fix VLAN cleanup flow (git-fixes).\n- net/mlx5e: Fix VLAN create flow (git-fixes).\n- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).\n- net/mlx5e: Fix two double free cases (bsc#1046305).\n- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (bsc#1075020).\n- net/mlx5e: TX, Fix consumer index of error cqe dump (bsc#1103990 ).\n- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (bsc#1103990).\n- net/sched: act_tunnel_key: fix OOB write in case of IPv6 ERSPAN tunnels (bsc#1109837).\n- net/smc: cancel event worker during device removal (git-fixes).\n- net/smc: check for valid ib_client_data (git-fixes).\n- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).\n- net/smc: receive pending data after RCV_SHUTDOWN (git-fixes).\n- net/smc: receive returns without data (git-fixes).\n- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).\n- net: atlantic: fix potential error handling (git-fixes).\n- net: atlantic: fix use after free kasan warn (git-fixes).\n- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).\n- net: bcmgenet: reapply manual settings to the PHY (git-fixes).\n- net: broadcom/bcmsysport: Fix signedness in bcm_sysport_probe() (git-fixes).\n- net: cbs: Fix software cbs to consider packet sending time (bsc#1109837).\n- net: dsa: LAN9303: select REGMAP when LAN9303 enable (git-fixes).\n- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (git-fixes).\n- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).\n- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).\n- net: ethernet: stmmac: Fix signedness bug in ipq806x_gmac_of_parse() (git-fixes).\n- net: freescale: fec: Fix ethtool -d runtime PM (git-fixes).\n- net: hns3: add a missing uninit debugfs when unload driver (bsc#1104353).\n- net: hns3: add compatible handling for command HCLGE_OPC_PF_RST_DONE (git-fixes).\n- net: hns3: add management table after IMP reset (bsc#1104353 ).\n- net: hns3: check reset interrupt status when reset fails (git-fixes).\n- net: hns3: clear reset interrupt status in hclge_irq_handle() (git-fixes).\n- net: hns3: fix a TX timeout issue (bsc#1104353).\n- net: hns3: fix a wrong reset interrupt status mask (git-fixes).\n- net: hns3: fix error VF index when setting VLAN offload (bsc#1104353).\n- net: hns3: fix error handling for desc filling (bsc#1104353 ).\n- net: hns3: fix for not calculating TX BD send size correctly (bsc#1126390).\n- net: hns3: fix interrupt clearing error for VF (bsc#1104353 ).\n- net: hns3: fix mis-counting IRQ vector numbers issue (bsc#1104353).\n- net: hns3: fix shaper parameter algorithm (bsc#1104353 ).\n- net: hns3: fix the number of queues actually used by ARQ (bsc#1104353).\n- net: hns3: fix use-after-free when doing self test (bsc#1104353 ).\n- net: hns3: reallocate SSU\u0027 buffer size when pfc_en changes (bsc#1104353).\n- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (bsc#1098633).\n- net: mvpp2: Fix error return code in mvpp2_open() (bsc#1119113 ).\n- net: mvpp2: fix pkt coalescing int-threshold configuration (bsc#1098633).\n- net: phy: Allow BCM54616S PHY to setup internal TX/RX clock delay (git-fixes).\n- net: phy: Avoid multiple suspends (git-fixes).\n- net: phy: broadcom: Fix RGMII delays configuration for BCM54210E (git-fixes).\n- net: phy: micrel: Discern KSZ8051 and KSZ8795 PHYs (git-fixes).\n- net: phy: micrel: make sure the factory test bit is cleared (git-fixes).\n- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).\n- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).\n- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).\n- net: stmmac: Do not accept invalid MTU values (git-fixes).\n- net: stmmac: Enable 16KB buffer size (git-fixes).\n- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).\n- net: stmmac: dwmac-meson8b: Fix signedness bug in probe (git-fixes).\n- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).\n- net: stmmac: fix length of PTP clock\u0027s name string (git-fixes).\n- net: stmmac: gmac4+: Not all Unicast addresses may be available (git-fixes).\n- net: sunrpc: interpret the return value of kstrtou32 correctly (git-fixes).\n- net: team: fix memory leak in __team_options_register (git-fixes).\n- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).\n- net: usb: lan78xx: Fix error message format specifier (git-fixes).\n- net: usb: sr9800: fix uninitialized local variable (git-fixes).\n- net: vlan: avoid leaks on register_vlan_dev() failures (git-fixes).\n- net_failover: fixed rollback in net_failover_open() (bsc#1109837).\n- net_sched: let qdisc_put() accept NULL pointer (bsc#1056657 bsc#1056653 bsc#1056787).\n- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n- nfp: validate the return code from dev_queue_xmit() (git-fixes).\n- nfs_common: need lock during iterate through the list (git-fixes).\n- nfsd4: readdirplus shouldn\u0027t return parent of export (git-fixes).\n- nfsd: Fix message level for normal termination (git-fixes).\n- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).\n- page_frag: Recover from memory pressure (git fixes (mm/pgalloc)).\n- parport: load lowlevel driver if ports not found (git-fixes).\n- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).\n- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).\n- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).\n- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).\n- powerpc/perf: Add generic compat mode pmu driver (bsc#1178900 ltc#189284).\n- powerpc/perf: Fix crashes with generic_compat_pmu \u0026 BHRB (bsc#1178900 ltc#189284 git-fixes).\n- powerpc/perf: init pmu from core-book3s (bsc#1178900 ltc#189284).\n- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).\n- qed: Fix race condition between scheduling and destroying the slowpath workqueue (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix use after free in qed_chain_free (bsc#1050536 bsc#1050538).\n- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).\n- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).\n- regmap: debugfs: check count when read regmap file (git-fixes).\n- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).\n- regulator: pfuze100-regulator: Variable \u0027val\u0027 in pfuze100_regulator_probe() could be uninitialized (git-fixes).\n- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).\n- remoteproc: Fix wrong rvring index computation (git-fixes).\n- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).\n- rtc: 88pm860x: fix possible race condition (git-fixes).\n- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).\n- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).\n- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).\n- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- s390/dasd: fix list corruption of lcu list (bsc#1181170 LTC#190915).\n- s390/dasd: fix list corruption of pavgroup group list (bsc#1181170 LTC#190915).\n- s390/dasd: prevent inconsistent LCU device data (bsc#1181170 LTC#190915).\n- s390/qeth: delay draining the TX buffers (git-fixes).\n- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).\n- s390/qeth: fix deadlock during recovery (git-fixes).\n- s390/qeth: fix locking for discipline setup / removal (git-fixes).\n- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).\n- sched/fair: Fix enqueue_task_fair warning (bsc#1179093).\n- sched/fair: Fix enqueue_task_fair() warning some more (bsc#1179093).\n- sched/fair: Fix reordering of enqueue/dequeue_task_fair() (bsc#1179093).\n- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (bsc#1179093).\n- sched/fair: Reorder enqueue/dequeue_task_fair path (bsc#1179093).\n- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049, git-fixes).\n- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).\n- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).\n- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).\n- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).\n- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).\n- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).\n- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).\n- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).\n- scsi: lpfc: Fix target reset failing (bsc#1180891).\n- scsi: lpfc: Fix vport create logging (bsc#1180891).\n- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).\n- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).\n- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).\n- scsi: lpfc: Simplify bool comparison (bsc#1180891).\n- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).\n- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).\n- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).\n- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).\n- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).\n- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- soc: imx: gpc: fix power up sequencing (git-fixes).\n- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).\n- spi: Fix memory leak on splited transfers (git-fixes).\n- spi: cadence: cache reference clock rate during probe (git-fixes).\n- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).\n- spi: dw: Fix Rx-only DMA transfers (git-fixes).\n- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).\n- spi: img-spfi: fix potential double release (git-fixes).\n- spi: pxa2xx: Add missed security checks (git-fixes).\n- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).\n- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).\n- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).\n- spi: tegra20-slink: add missed clk_unprepare (git-fixes).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).\n- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).\n- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).\n- staging: rtl8188eu: fix possible null dereference (git-fixes).\n- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).\n- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- staging: wlan-ng: properly check endpoint types (git-fixes).\n- team: set dev-\u003eneeded_headroom in team_setup_by_port() (git-fixes).\n- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).\n- tty: always relink the port (git-fixes).\n- tty: link tty and port before configuring it as console (git-fixes).\n- tty: synclink_gt: Adjust indentation in several functions (git-fixes).\n- tty: synclinkmp: Adjust indentation in several functions (git-fixes).\n- tty:serial:mvebu-uart:fix a wrong return (git-fixes).\n- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (bsc#1109837).\n- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).\n- usb: dwc2: Fix IN FIFO allocation (git-fixes).\n- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).\n- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).\n- usb: fsl: Check memory resource before releasing it (git-fixes).\n- usb: gadget: composite: Fix possible double free memory bug (git-fixes).\n- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).\n- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).\n- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).\n- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).\n- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).\n- usb: gadget: fix wrong endpoint desc (git-fixes).\n- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).\n- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).\n- usb: gadget: select CONFIG_CRC32 (git-fixes).\n- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).\n- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).\n- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n- usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).\n- usb: udc: core: Use lock when write to soft_connect (git-fixes).\n- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).\n- usblp: poison URBs upon disconnect (git-fixes).\n- veth: Adjust hard_start offset on redirect XDP frames (bsc#1109837).\n- vfio iommu: Add dma available capability (bsc#1179573 LTC#190106).\n- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181231).\n- vhost/vsock: fix vhost vsock cid hashing inconsistent (git-fixes).\n- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).\n- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).\n- vt: Reject zero-sized screen buffer size (git-fixes).\n- vt: do not hardcode the mem allocation upper bound (git-fixes).\n- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).\n- watchdog: da9062: do not ping the hw during stop() (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- wil6210: select CONFIG_CRC32 (git-fixes).\n- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n- wireless: Use offsetof instead of custom macro (git-fixes).\n- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191).\n- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191).\n- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).\n- x86/i8259: Use printk_deferred() to prevent deadlock (bsc#1112178).\n- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191).\n- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).\n- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).\n- x86/mm/numa: Remove uninitialized_var() usage (bsc#1112178).\n- x86/mm: Fix leak of pmd ptlock (bsc#1112178).\n- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191).\n- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1112178).\n- x86/resctrl: Do not move a task to the same resource group (bsc#1112178).\n- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1112178).\n- xdp: Fix xsk_generic_xmit errno (bsc#1109837).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).\n- xhci: tegra: Delay for disabling LFPS detector (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-433,SUSE-SLE-RT-12-SP5-2021-433", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0433-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0433-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210433-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0433-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1046540", "url": "https://bugzilla.suse.com/1046540" }, { "category": "self", "summary": "SUSE Bug 1046542", "url": "https://bugzilla.suse.com/1046542" }, { "category": "self", "summary": "SUSE Bug 1046648", "url": "https://bugzilla.suse.com/1046648" }, { "category": "self", "summary": "SUSE Bug 1050242", "url": "https://bugzilla.suse.com/1050242" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050538", "url": "https://bugzilla.suse.com/1050538" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1056653", "url": "https://bugzilla.suse.com/1056653" }, { "category": "self", "summary": "SUSE Bug 1056657", "url": "https://bugzilla.suse.com/1056657" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1074220", "url": "https://bugzilla.suse.com/1074220" }, { "category": "self", "summary": "SUSE Bug 1075020", "url": "https://bugzilla.suse.com/1075020" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104270", "url": "https://bugzilla.suse.com/1104270" }, { "category": "self", "summary": "SUSE Bug 1104277", "url": "https://bugzilla.suse.com/1104277" }, { "category": "self", "summary": "SUSE Bug 1104279", "url": "https://bugzilla.suse.com/1104279" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1104427", "url": "https://bugzilla.suse.com/1104427" }, { "category": "self", "summary": "SUSE Bug 1104742", "url": "https://bugzilla.suse.com/1104742" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111981", "url": "https://bugzilla.suse.com/1111981" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1126206", "url": "https://bugzilla.suse.com/1126206" }, { "category": "self", "summary": "SUSE Bug 1126390", "url": "https://bugzilla.suse.com/1126390" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1136348", "url": "https://bugzilla.suse.com/1136348" }, { "category": "self", "summary": "SUSE Bug 1144912", "url": "https://bugzilla.suse.com/1144912" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1163727", "url": "https://bugzilla.suse.com/1163727" }, { "category": "self", "summary": "SUSE Bug 1172145", "url": "https://bugzilla.suse.com/1172145" }, { "category": "self", "summary": "SUSE Bug 1174206", "url": "https://bugzilla.suse.com/1174206" }, { "category": "self", "summary": "SUSE Bug 1176831", "url": "https://bugzilla.suse.com/1176831" }, { "category": "self", "summary": "SUSE Bug 1176846", "url": "https://bugzilla.suse.com/1176846" }, { "category": "self", "summary": "SUSE Bug 1178036", "url": "https://bugzilla.suse.com/1178036" }, { "category": "self", "summary": "SUSE Bug 1178049", "url": "https://bugzilla.suse.com/1178049" }, { "category": "self", "summary": "SUSE Bug 1178372", "url": "https://bugzilla.suse.com/1178372" }, { "category": "self", "summary": "SUSE Bug 1178631", "url": "https://bugzilla.suse.com/1178631" }, { "category": "self", "summary": "SUSE Bug 1178684", "url": "https://bugzilla.suse.com/1178684" }, { "category": "self", "summary": "SUSE Bug 1178900", "url": "https://bugzilla.suse.com/1178900" }, { "category": "self", "summary": "SUSE Bug 1179093", "url": "https://bugzilla.suse.com/1179093" }, { "category": "self", "summary": "SUSE Bug 1179508", "url": "https://bugzilla.suse.com/1179508" }, { "category": "self", "summary": "SUSE Bug 1179509", "url": "https://bugzilla.suse.com/1179509" }, { "category": "self", "summary": "SUSE Bug 1179563", "url": "https://bugzilla.suse.com/1179563" }, { "category": "self", "summary": "SUSE Bug 1179573", "url": "https://bugzilla.suse.com/1179573" }, { "category": "self", "summary": "SUSE Bug 1179575", "url": "https://bugzilla.suse.com/1179575" }, { "category": "self", "summary": "SUSE Bug 1179878", "url": "https://bugzilla.suse.com/1179878" }, { "category": "self", "summary": "SUSE Bug 1180008", "url": "https://bugzilla.suse.com/1180008" }, { "category": "self", "summary": "SUSE Bug 1180130", "url": "https://bugzilla.suse.com/1180130" }, { "category": "self", "summary": "SUSE Bug 1180559", "url": "https://bugzilla.suse.com/1180559" }, { "category": "self", "summary": "SUSE Bug 1180562", "url": "https://bugzilla.suse.com/1180562" }, { "category": "self", "summary": "SUSE Bug 1180676", "url": "https://bugzilla.suse.com/1180676" }, { "category": "self", "summary": "SUSE Bug 1180765", "url": "https://bugzilla.suse.com/1180765" }, { "category": "self", "summary": "SUSE Bug 1180812", "url": "https://bugzilla.suse.com/1180812" }, { "category": "self", "summary": "SUSE Bug 1180859", "url": "https://bugzilla.suse.com/1180859" }, { "category": "self", "summary": "SUSE Bug 1180891", "url": "https://bugzilla.suse.com/1180891" }, { "category": "self", "summary": "SUSE Bug 1180912", "url": "https://bugzilla.suse.com/1180912" }, { "category": "self", "summary": "SUSE Bug 1181001", "url": "https://bugzilla.suse.com/1181001" }, { "category": "self", "summary": "SUSE Bug 1181018", "url": "https://bugzilla.suse.com/1181018" }, { "category": "self", "summary": "SUSE Bug 1181170", "url": "https://bugzilla.suse.com/1181170" }, { "category": "self", "summary": "SUSE Bug 1181230", "url": "https://bugzilla.suse.com/1181230" }, { "category": "self", "summary": "SUSE Bug 1181231", "url": "https://bugzilla.suse.com/1181231" }, { "category": "self", "summary": "SUSE Bug 1181349", "url": "https://bugzilla.suse.com/1181349" }, { "category": "self", "summary": "SUSE Bug 1181425", "url": "https://bugzilla.suse.com/1181425" }, { "category": "self", "summary": "SUSE Bug 1181504", "url": "https://bugzilla.suse.com/1181504" }, { "category": "self", "summary": "SUSE Bug 1181553", "url": "https://bugzilla.suse.com/1181553" }, { "category": "self", "summary": "SUSE Bug 1181645", "url": "https://bugzilla.suse.com/1181645" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27835 page", "url": "https://www.suse.com/security/cve/CVE-2020-27835/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28374 page", "url": "https://www.suse.com/security/cve/CVE-2020-28374/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29568 page", "url": "https://www.suse.com/security/cve/CVE-2020-29568/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29569 page", "url": "https://www.suse.com/security/cve/CVE-2020-29569/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36158 page", "url": "https://www.suse.com/security/cve/CVE-2020-36158/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0342 page", "url": "https://www.suse.com/security/cve/CVE-2021-0342/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20177 page", "url": "https://www.suse.com/security/cve/CVE-2021-20177/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3347 page", "url": "https://www.suse.com/security/cve/CVE-2021-3347/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3348 page", "url": "https://www.suse.com/security/cve/CVE-2021-3348/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-02-11T08:19:00Z", "generator": { "date": "2021-02-11T08:19:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0433-1", "initial_release_date": "2021-02-11T08:19:00Z", "revision_history": [ { "date": "2021-02-11T08:19:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.31.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.31.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.31.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.31.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.31.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.31.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-10.31.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-10.31.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.31.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.31.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-10.31.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-10.31.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-10.31.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-10.31.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.31.1.x86_64", "product_id": "kernel-rt-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.31.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.31.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-10.31.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-kgraft-devel-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-rt-kgraft-devel-4.12.14-10.31.1.x86_64", "product_id": "kernel-rt-kgraft-devel-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.31.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-10.31.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-10.31.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-rt_debug-kgraft-devel-4.12.14-10.31.1.x86_64", "product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.31.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.31.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-10.31.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-10.31.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-10.31.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-10.31.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.31.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.31.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-10.31.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-10.31.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-10.31.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.31.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.31.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.31.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.31.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.31.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.31.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.31.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.31.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.31.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.31.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.31.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.31.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.31.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.31.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:19:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-27835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27835" } ], "notes": [ { "category": "general", "text": "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27835", "url": "https://www.suse.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "SUSE Bug 1179878 for CVE-2020-27835", "url": "https://bugzilla.suse.com/1179878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:19:00Z", "details": "moderate" } ], "title": "CVE-2020-27835" }, { "cve": "CVE-2020-28374", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28374" } ], "notes": [ { "category": "general", "text": "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28374", "url": "https://www.suse.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "SUSE Bug 1178372 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1178372" }, { "category": "external", "summary": "SUSE Bug 1178684 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1178684" }, { "category": "external", "summary": "SUSE Bug 1180676 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1180676" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:19:00Z", "details": "important" } ], "title": "CVE-2020-28374" }, { "cve": "CVE-2020-29568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29568" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29568", "url": "https://www.suse.com/security/cve/CVE-2020-29568" }, { "category": "external", "summary": "SUSE Bug 1179508 for CVE-2020-29568", "url": "https://bugzilla.suse.com/1179508" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:19:00Z", "details": "moderate" } ], "title": "CVE-2020-29568" }, { "cve": "CVE-2020-29569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29569" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29569", "url": "https://www.suse.com/security/cve/CVE-2020-29569" }, { "category": "external", "summary": "SUSE Bug 1179509 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1179509" }, { "category": "external", "summary": "SUSE Bug 1180008 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1180008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:19:00Z", "details": "important" } ], "title": "CVE-2020-29569" }, { "cve": "CVE-2020-36158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36158" } ], "notes": [ { "category": "general", "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36158", "url": "https://www.suse.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "SUSE Bug 1180559 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180559" }, { "category": "external", "summary": "SUSE Bug 1180562 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:19:00Z", "details": "important" } ], "title": "CVE-2020-36158" }, { "cve": "CVE-2021-0342", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0342" } ], "notes": [ { "category": "general", "text": "In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0342", "url": "https://www.suse.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "SUSE Bug 1180812 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180812" }, { "category": "external", "summary": "SUSE Bug 1180859 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:19:00Z", "details": "important" } ], "title": "CVE-2021-0342" }, { "cve": "CVE-2021-20177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20177" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20177", "url": "https://www.suse.com/security/cve/CVE-2021-20177" }, { "category": "external", "summary": "SUSE Bug 1180765 for CVE-2021-20177", "url": "https://bugzilla.suse.com/1180765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:19:00Z", "details": "moderate" } ], "title": "CVE-2021-20177" }, { "cve": "CVE-2021-3347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3347" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3347", "url": "https://www.suse.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "SUSE Bug 1181349 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181349" }, { "category": "external", "summary": "SUSE Bug 1181553 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181553" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:19:00Z", "details": "important" } ], "title": "CVE-2021-3347" }, { "cve": "CVE-2021-3348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3348" } ], "notes": [ { "category": "general", "text": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3348", "url": "https://www.suse.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "SUSE Bug 1181504 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181504" }, { "category": "external", "summary": "SUSE Bug 1181645 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.31.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.31.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.31.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:19:00Z", "details": "moderate" } ], "title": "CVE-2021-3348" } ] }
suse-su-2021:0347-1
Vulnerability from csaf_suse
Published
2021-02-09 08:54
Modified
2021-02-09 08:54
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-36158: Fixed an issue wich might have allowed a remote attackers to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start() (bnc#1180559).
- CVE-2020-28374: Fixed a vulnerability caused by insufficient identifier checking in the LIO SCSI target code. This could have been used by a remote attackers to read or write files via directory traversal in an XCOPY request (bnc#1178372).
The following non-security bugs were fixed:
- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- bitmap: remove unused function declaration (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu: prevent double kfree ttm->sg (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/aspeed: Fix Kconfig warning & subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning & subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: * context changes
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: * context changes
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine->wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- module: delay kobject uevent until after module init call (bsc#1178631).
- Move 'btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).' to sorted section
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr->ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- Revert 'ceph: allow rename operation under different quota realms' (bsc#1180541).
- Revert 'nfsd4: support change_attr_type attribute' (for-next).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base->next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
Patchnames
SUSE-2021-347,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-347
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).\n- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).\n- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)\n- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).\n- CVE-2020-36158: Fixed an issue wich might have allowed a remote attackers to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start() (bnc#1180559).\n- CVE-2020-28374: Fixed a vulnerability caused by insufficient identifier checking in the LIO SCSI target code. This could have been used by a remote attackers to read or write files via directory traversal in an XCOPY request (bnc#1178372).\n\nThe following non-security bugs were fixed:\n\n- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).\n- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).\n- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).\n- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).\n- ACPI: sysfs: Prefer \u0027compatible\u0027 modalias (git-fixes).\n- ALSA: doc: Fix reference to mixart.rst (git-fixes).\n- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).\n- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).\n- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).\n- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).\n- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).\n- ALSA: hda/realtek: Add two \u0027Intel Reference board\u0027 SSID in the ALC256 (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).\n- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).\n- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).\n- ALSA: hda/realtek - Modify Dell platform name (git-fixes).\n- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).\n- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).\n- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).\n- ALSA: hda/via: Add minimum mute flag (git-fixes).\n- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).\n- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).\n- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).\n- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).\n- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).\n- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).\n- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).\n- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).\n- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).\n- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).\n- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).\n- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).\n- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).\n- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).\n- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).\n- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).\n- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).\n- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).\n- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).\n- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).\n- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).\n- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).\n- arm64: pgtable: Fix pte_accessible() (bsc#1180130).\n- ASoC: ak4458: correct reset polarity (git-fixes).\n- ASoC: dapm: remove widget from dirty list on free (git-fixes).\n- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).\n- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).\n- bitmap: remove unused function declaration (git-fixes).\n- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).\n- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).\n- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).\n- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).\n- bpf: Fix bpf_put_raw_tracepoint()\u0027s use of __module_address() (git-fixes).\n- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).\n- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).\n- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).\n- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).\n- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).\n- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).\n- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).\n- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).\n- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).\n- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).\n- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).\n- can: dev: prevent potential information leak in can_fill_info() (git-fixes).\n- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).\n- CDC-NCM: remove \u0027connected\u0027 log message (git-fixes).\n- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).\n- crypto: asym_tpm: correct zero out potential secrets (git-fixes).\n- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).\n- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).\n- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).\n- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).\n- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).\n- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).\n- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).\n- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).\n- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).\n- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).\n- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).\n- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:\n- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).\n- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).\n- drm/amd/display: Avoid MST manager resource leak (git-fixes).\n- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).\n- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).\n- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).\n- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).\n- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).\n- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).\n- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).\n- drm/amd/display: Increase timeout for DP Disable (git-fixes).\n- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amd/display: Retry AUX write when fail occurs (git-fixes).\n- drm/amd/display: Stop if retimer is not available (git-fixes).\n- drm/amd/display: update nv1x stutter latencies (git-fixes).\n- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).\n- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).\n- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).\n- drm/amdgpu: do not map BO in reserved region (git-fixes).\n- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).\n- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).\n- drm/amdgpu: increase atombios cmd timeout (git-fixes).\n- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).\n- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).\n- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu: prevent double kfree ttm-\u003esg (git-fixes).\n- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).\n- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).\n- drm/amdkfd: fix a memory leak issue (git-fixes).\n- drm/amdkfd: Fix leak in dmabuf import (git-fixes).\n- drm/amdkfd: fix restore worker race condition (git-fixes).\n- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).\n- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).\n- drm/aspeed: Fix Kconfig warning \u0026 subsequent build errors (bsc#1152472)\n- drm/aspeed: Fix Kconfig warning \u0026 subsequent build errors (git-fixes).\n- drm/atomic: put state on error path (git-fixes).\n- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)\n- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).\n- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).\n- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).\n- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: \t* context changes\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).\n- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).\n- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).\n- drm/i915: Check for all subplatform bits (git-fixes).\n- drm/i915: clear the gpu reloc batch (git-fixes).\n- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: \t* context changes\n- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).\n- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).\n- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).\n- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).\n- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).\n- drm/i915: Force VT\u0027d workarounds when running as a guest OS (git-fixes).\n- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).\n- drm/i915/gt: Delay execlist processing for tgl (git-fixes).\n- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).\n- drm/i915/gt: Prevent use of engine-\u003ewa_ctx after error (git-fixes).\n- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).\n- drm/i915/gvt: return error when failing to take the module reference (git-fixes).\n- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).\n- drm/i915: Handle max_bpc==16 (git-fixes).\n- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).\n- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)\n- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).\n- drm/msm/a6xx: fix a potential overflow issue (git-fixes).\n- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).\n- drm/msm: add shutdown support for display platform_driver (git-fixes).\n- drm/msm: Disable preemption on all 5xx targets (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dpu: Fix scale params in plane validation (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).\n- drm/msm: fix leaks if initialization fails (git-fixes).\n- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).\n- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).\n- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).\n- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).\n- drm/nouveau/mmu: fix vram heap sizing (git-fixes).\n- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).\n- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).\n- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).\n- drm/omap: fix incorrect lock state (git-fixes).\n- drm/omap: fix possible object reference leak (git-fixes).\n- drm/panfrost: add amlogic reset quirk callback (git-fixes).\n- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- drm/scheduler: Avoid accessing freed bad job (git-fixes).\n- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)\n- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).\n- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).\n- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).\n- drm/sun4i: mixer: Extend regmap max_register (git-fixes).\n- drm/syncobj: Fix use-after-free (git-fixes).\n- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).\n- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).\n- drm/ttm: fix eviction valuable range check (git-fixes).\n- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)\n- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).\n- drm/tve200: Stabilize enable/disable (git-fixes).\n- drm/vc4: drv: Add error handding for bind (git-fixes).\n- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).\n- EDAC/amd64: Fix PCI component registration (bsc#1152489).\n- ehci: fix EHCI host controller initialization sequence (git-fixes).\n- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).\n- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 (\u0027kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\u0027)\n- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).\n- floppy: reintroduce O_NDELAY fix (boo#1181018).\n- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).\n- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).\n- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).\n- futex: Remove needless goto\u0027s (bsc#1149032).\n- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).\n- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).\n- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).\n- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).\n- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).\n- HID: logitech-dj: add the G602 receiver (git-fixes).\n- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).\n- HID: multitouch: do not filter mice nodes (git-fixes).\n- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).\n- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).\n- HID: wacom: Constify attribute_groups (git-fixes).\n- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).\n- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).\n- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).\n- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).\n- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).\n- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).\n- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).\n- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).\n- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).\n- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).\n- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).\n- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).\n- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).\n- iio: ad5504: Fix setting power-down state (git-fixes).\n- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).\n- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).\n- ionic: account for vlan tag len in rx buffer len (bsc#1167773).\n- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).\n- kdb: Fix pager search for multi-line strings (git-fixes).\n- kgdb: Drop malformed kernel doc comment (git-fixes).\n- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).\n- KVM: nVMX: Reload vmcs01 if getting vmcs12\u0027s pages fails (bsc#1181218).\n- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).\n- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/genalloc: fix the overflow when size is too big (git-fixes).\n- lib/string: remove unnecessary #undefs (git-fixes).\n- lockd: do not use interval-based rebinding over TCP (for-next).\n- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).\n- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).\n- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).\n- media: dvb-usb: Fix use-after-free access (bsc#1181104).\n- media: gp8psk: initialize stats at power control logic (git-fixes).\n- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).\n- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).\n- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).\n- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).\n- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).\n- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).\n- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).\n- module: delay kobject uevent until after module init call (bsc#1178631).\n- Move \u0027btrfs: qgroup: do not try to wait flushing if we\u0027re already holding a transaction (bsc#1179575).\u0027 to sorted section\n- mt7601u: fix kernel crash unplugging the device (git-fixes).\n- mt7601u: fix rx buffer refcounting (git-fixes).\n- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).\n- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).\n- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).\n- net: hns3: fix a phy loopback fail issue (bsc#1154353).\n- net: hns3: remove a misused pragma packed (bsc#1154353).\n- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).\n- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).\n- net/smc: cancel event worker during device removal (git-fixes).\n- net/smc: check for valid ib_client_data (git-fixes).\n- net/smc: fix cleanup for linkgroup setup failures (git-fixes).\n- net/smc: fix direct access to ib_gid_addr-\u003endev in smc_ib_determine_gid() (git-fixes).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: fix valid DMBE buffer sizes (git-fixes).\n- net/smc: no peer ID in CLC decline for SMCD (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: transfer fasync_list in case of fallback (git-fixes).\n- net: sunrpc: Fix \u0027snprintf\u0027 return value check in \u0027do_xprt_debugfs\u0027 (for-next).\n- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).\n- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).\n- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).\n- nfs_common: need lock during iterate through the list (for-next).\n- nfsd4: readdirplus shouldn\u0027t return parent of export (git-fixes).\n- nfsd: Fix message level for normal termination (for-next).\n- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).\n- NFS: nfs_igrab_and_active must first reference the superblock (for-next).\n- NFS/pNFS: Fix a leak of the layout \u0027plh_outstanding\u0027 counter (for-next).\n- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).\n- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).\n- NFSv4.2: condition READDIR\u0027s mask for security label based on LSM state (for-next).\n- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).\n- nvme-multipath: fix bogus request queue reference put (bsc#1175389).\n- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).\n- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).\n- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).\n- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).\n- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).\n- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).\n- PM: hibernate: flush swap writer after marking (git-fixes).\n- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).\n- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).\n- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).\n- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).\n- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).\n- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).\n- power: vexpress: add suppress_bind_attrs to true (git-fixes).\n- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).\n- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).\n- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).\n- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).\n- r8169: work around power-saving bug on some chip versions (git-fixes).\n- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).\n- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).\n- Revert \u0027ceph: allow rename operation under different quota realms\u0027 (bsc#1180541).\n- Revert \u0027nfsd4: support change_attr_type attribute\u0027 (for-next).\n- Revive usb-audio Keep Interface mixer (bsc#1181014).\n- rtc: pl031: fix resource leak in pl031_probe (git-fixes).\n- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).\n- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).\n- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).\n- s390/dasd: fix list corruption of lcu list (git-fixes).\n- s390/dasd: fix list corruption of pavgroup group list (git-fixes).\n- s390/dasd: prevent inconsistent LCU device data (git-fixes).\n- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).\n- s390/qeth: consolidate online/offline code (git-fixes).\n- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).\n- s390/qeth: fix deadlock during recovery (git-fixes).\n- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).\n- s390/qeth: fix locking for discipline setup / removal (git-fixes).\n- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).\n- sched/fair: Check for idle core in wake_affine (git fixes (sched)).\n- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).\n- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).\n- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).\n- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).\n- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).\n- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).\n- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).\n- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).\n- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).\n- scsi: lpfc: Fix target reset failing (bsc#1180891).\n- scsi: lpfc: Fix vport create logging (bsc#1180891).\n- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).\n- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).\n- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).\n- scsi: lpfc: Simplify bool comparison (bsc#1180891).\n- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).\n- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).\n- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).\n- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).\n- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).\n- selftests: net: fib_tests: remove duplicate log test (git-fixes).\n- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).\n- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).\n- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).\n- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).\n- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).\n- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).\n- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).\n- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).\n- spi: cadence: cache reference clock rate during probe (git-fixes).\n- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).\n- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).\n- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).\n- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).\n- swiotlb: fix \u0027x86: Do not panic if can not alloc buffer for swiotlb\u0027 (git-fixes).\n- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).\n- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).\n- timers: Use only bucket expiry for base-\u003enext_expiry value (bsc#1181318).\n- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).\n- USB: cdc-acm: blacklist another IR Droid device (git-fixes).\n- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).\n- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).\n- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).\n- usb: dwc3: core: Properly default unspecified speed (git-fixes).\n- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- USB: ehci: fix an interrupt calltrace error (git-fixes).\n- usb: gadget: aspeed: fix stop dma register setting (git-fixes).\n- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).\n- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).\n- usb: gadget: enable super speed plus (git-fixes).\n- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).\n- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).\n- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).\n- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).\n- usb: gadget: select CONFIG_CRC32 (git-fixes).\n- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).\n- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).\n- USB: serial: option: add LongSung M5710 module support (git-fixes).\n- USB: serial: option: add Quectel EM160R-GL (git-fixes).\n- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).\n- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).\n- usb: udc: core: Use lock when write to soft_connect (git-fixes).\n- usb: usbip: vhci_hcd: protect shift size (git-fixes).\n- USB: usblp: fix DMA to stack (git-fixes).\n- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).\n- USB: yurex: fix control-URB timeout handling (git-fixes).\n- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).\n- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).\n- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).\n- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).\n- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).\n- video: fbdev: pvr2fb: initialize variables (git-fixes).\n- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).\n- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).\n- wil6210: select CONFIG_CRC32 (git-fixes).\n- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).\n- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).\n- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).\n- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).\n- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).\n- x86/mm: Fix leak of pmd ptlock (bsc#1152489).\n- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).\n- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).\n- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).\n- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).\n- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).\n- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).\n- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).\n- xen/privcmd: allow fetching resource sizes (bsc#1065600).\n- xfs: show the proper user quota options (bsc#1181538).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).\n- xhci: tegra: Delay for disabling LFPS detector (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-347,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-347", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0347-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0347-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210347-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0347-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1163727", "url": "https://bugzilla.suse.com/1163727" }, { "category": "self", "summary": "SUSE Bug 1163930", "url": "https://bugzilla.suse.com/1163930" }, { "category": "self", "summary": "SUSE Bug 1165545", "url": "https://bugzilla.suse.com/1165545" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1172355", "url": "https://bugzilla.suse.com/1172355" }, { "category": "self", "summary": "SUSE Bug 1175389", "url": "https://bugzilla.suse.com/1175389" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176831", "url": "https://bugzilla.suse.com/1176831" }, { "category": "self", "summary": "SUSE Bug 1176846", "url": "https://bugzilla.suse.com/1176846" }, { "category": "self", "summary": "SUSE Bug 1178142", "url": "https://bugzilla.suse.com/1178142" }, { "category": "self", "summary": "SUSE Bug 1178372", "url": "https://bugzilla.suse.com/1178372" }, { "category": "self", "summary": "SUSE Bug 1178631", "url": "https://bugzilla.suse.com/1178631" }, { "category": "self", "summary": "SUSE Bug 1178684", "url": "https://bugzilla.suse.com/1178684" }, { "category": "self", "summary": "SUSE Bug 1179142", "url": "https://bugzilla.suse.com/1179142" }, { "category": "self", "summary": "SUSE Bug 1179396", "url": "https://bugzilla.suse.com/1179396" }, { "category": "self", "summary": "SUSE Bug 1179508", "url": "https://bugzilla.suse.com/1179508" }, { "category": "self", "summary": "SUSE Bug 1179509", "url": "https://bugzilla.suse.com/1179509" }, { "category": "self", "summary": "SUSE Bug 1179567", "url": "https://bugzilla.suse.com/1179567" }, { "category": "self", "summary": "SUSE Bug 1179572", "url": "https://bugzilla.suse.com/1179572" }, { "category": "self", "summary": "SUSE Bug 1179575", "url": "https://bugzilla.suse.com/1179575" }, { "category": "self", "summary": "SUSE Bug 1179878", "url": "https://bugzilla.suse.com/1179878" }, { "category": "self", "summary": "SUSE Bug 1180008", "url": "https://bugzilla.suse.com/1180008" }, { "category": "self", "summary": "SUSE Bug 1180130", "url": "https://bugzilla.suse.com/1180130" }, { "category": "self", "summary": "SUSE Bug 1180264", "url": "https://bugzilla.suse.com/1180264" }, { "category": "self", "summary": "SUSE Bug 1180412", "url": "https://bugzilla.suse.com/1180412" }, { "category": "self", "summary": "SUSE Bug 1180541", "url": "https://bugzilla.suse.com/1180541" }, { "category": "self", "summary": "SUSE Bug 1180559", "url": "https://bugzilla.suse.com/1180559" }, { "category": "self", "summary": "SUSE Bug 1180562", "url": "https://bugzilla.suse.com/1180562" }, { "category": "self", "summary": "SUSE Bug 1180566", "url": "https://bugzilla.suse.com/1180566" }, { "category": "self", "summary": "SUSE Bug 1180676", "url": "https://bugzilla.suse.com/1180676" }, { "category": "self", "summary": "SUSE Bug 1180759", "url": "https://bugzilla.suse.com/1180759" }, { "category": "self", "summary": "SUSE Bug 1180765", "url": "https://bugzilla.suse.com/1180765" }, { "category": "self", "summary": "SUSE Bug 1180773", "url": "https://bugzilla.suse.com/1180773" }, { "category": "self", "summary": "SUSE Bug 1180809", "url": "https://bugzilla.suse.com/1180809" }, { "category": "self", "summary": "SUSE Bug 1180812", "url": "https://bugzilla.suse.com/1180812" }, { "category": "self", "summary": "SUSE Bug 1180848", "url": "https://bugzilla.suse.com/1180848" }, { "category": "self", "summary": "SUSE Bug 1180859", "url": "https://bugzilla.suse.com/1180859" }, { "category": "self", "summary": "SUSE Bug 1180889", "url": "https://bugzilla.suse.com/1180889" }, { "category": "self", "summary": "SUSE Bug 1180891", "url": "https://bugzilla.suse.com/1180891" }, { "category": "self", "summary": "SUSE Bug 1180971", "url": "https://bugzilla.suse.com/1180971" }, { "category": "self", "summary": "SUSE Bug 1181014", "url": "https://bugzilla.suse.com/1181014" }, { "category": "self", "summary": "SUSE Bug 1181018", "url": "https://bugzilla.suse.com/1181018" }, { "category": "self", "summary": "SUSE Bug 1181077", "url": "https://bugzilla.suse.com/1181077" }, { "category": "self", "summary": "SUSE Bug 1181104", "url": "https://bugzilla.suse.com/1181104" }, { "category": "self", "summary": "SUSE Bug 1181148", "url": "https://bugzilla.suse.com/1181148" }, { "category": "self", "summary": "SUSE Bug 1181158", "url": "https://bugzilla.suse.com/1181158" }, { "category": "self", "summary": "SUSE Bug 1181161", "url": "https://bugzilla.suse.com/1181161" }, { "category": "self", "summary": "SUSE Bug 1181169", "url": "https://bugzilla.suse.com/1181169" }, { "category": "self", "summary": "SUSE Bug 1181203", "url": "https://bugzilla.suse.com/1181203" }, { "category": "self", "summary": "SUSE Bug 1181217", "url": "https://bugzilla.suse.com/1181217" }, { "category": "self", "summary": "SUSE Bug 1181218", "url": "https://bugzilla.suse.com/1181218" }, { "category": "self", "summary": "SUSE Bug 1181219", "url": "https://bugzilla.suse.com/1181219" }, { "category": "self", "summary": "SUSE Bug 1181220", "url": "https://bugzilla.suse.com/1181220" }, { "category": "self", "summary": "SUSE Bug 1181237", "url": "https://bugzilla.suse.com/1181237" }, { "category": "self", "summary": "SUSE Bug 1181318", "url": "https://bugzilla.suse.com/1181318" }, { "category": "self", "summary": "SUSE Bug 1181335", "url": "https://bugzilla.suse.com/1181335" }, { "category": "self", "summary": "SUSE Bug 1181346", "url": "https://bugzilla.suse.com/1181346" }, { "category": "self", "summary": "SUSE Bug 1181349", "url": "https://bugzilla.suse.com/1181349" }, { "category": "self", "summary": "SUSE Bug 1181425", "url": "https://bugzilla.suse.com/1181425" }, { "category": "self", "summary": "SUSE Bug 1181494", "url": "https://bugzilla.suse.com/1181494" }, { "category": "self", "summary": "SUSE Bug 1181504", "url": "https://bugzilla.suse.com/1181504" }, { "category": "self", "summary": "SUSE Bug 1181511", "url": "https://bugzilla.suse.com/1181511" }, { "category": "self", "summary": "SUSE Bug 1181538", "url": "https://bugzilla.suse.com/1181538" }, { "category": "self", "summary": "SUSE Bug 1181553", "url": "https://bugzilla.suse.com/1181553" }, { "category": "self", "summary": "SUSE Bug 1181584", "url": "https://bugzilla.suse.com/1181584" }, { "category": "self", "summary": "SUSE Bug 1181645", "url": "https://bugzilla.suse.com/1181645" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25211 page", "url": "https://www.suse.com/security/cve/CVE-2020-25211/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27835 page", "url": "https://www.suse.com/security/cve/CVE-2020-27835/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28374 page", "url": "https://www.suse.com/security/cve/CVE-2020-28374/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29568 page", "url": "https://www.suse.com/security/cve/CVE-2020-29568/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29569 page", "url": "https://www.suse.com/security/cve/CVE-2020-29569/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36158 page", "url": "https://www.suse.com/security/cve/CVE-2020-36158/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0342 page", "url": "https://www.suse.com/security/cve/CVE-2021-0342/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20177 page", "url": "https://www.suse.com/security/cve/CVE-2021-20177/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3347 page", "url": "https://www.suse.com/security/cve/CVE-2021-3347/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3348 page", "url": "https://www.suse.com/security/cve/CVE-2021-3348/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-02-09T08:54:08Z", "generator": { "date": "2021-02-09T08:54:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0347-1", "initial_release_date": "2021-02-09T08:54:08Z", "revision_history": [ { "date": "2021-02-09T08:54:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-18.35.2.noarch", "product": { "name": "kernel-devel-azure-5.3.18-18.35.2.noarch", "product_id": "kernel-devel-azure-5.3.18-18.35.2.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-18.35.2.noarch", "product": { "name": "kernel-source-azure-5.3.18-18.35.2.noarch", "product_id": "kernel-source-azure-5.3.18-18.35.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-18.35.2.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-18.35.2.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-18.35.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-18.35.2.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-18.35.2.x86_64", "product_id": "dlm-kmp-azure-5.3.18-18.35.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-18.35.2.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-18.35.2.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-18.35.2.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-18.35.2.x86_64", "product": { "name": "kernel-azure-5.3.18-18.35.2.x86_64", "product_id": "kernel-azure-5.3.18-18.35.2.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-18.35.2.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-18.35.2.x86_64", "product_id": "kernel-azure-devel-5.3.18-18.35.2.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-18.35.2.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-18.35.2.x86_64", "product_id": "kernel-azure-extra-5.3.18-18.35.2.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-18.35.2.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-18.35.2.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-18.35.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-18.35.2.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-18.35.2.x86_64", "product_id": "kernel-syms-azure-5.3.18-18.35.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-18.35.2.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-18.35.2.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-18.35.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-18.35.2.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-18.35.2.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-18.35.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-18.35.2.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-18.35.2.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-18.35.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-18.35.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64" }, "product_reference": "kernel-azure-5.3.18-18.35.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-18.35.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-18.35.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-18.35.2.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-18.35.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-18.35.2.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch" }, "product_reference": "kernel-source-azure-5.3.18-18.35.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-18.35.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-18.35.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25211" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25211", "url": "https://www.suse.com/security/cve/CVE-2020-25211" }, { "category": "external", "summary": "SUSE Bug 1176395 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1176395" }, { "category": "external", "summary": "SUSE Bug 1192356 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1192356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "moderate" } ], "title": "CVE-2020-25211" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-27835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27835" } ], "notes": [ { "category": "general", "text": "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27835", "url": "https://www.suse.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "SUSE Bug 1179878 for CVE-2020-27835", "url": "https://bugzilla.suse.com/1179878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "moderate" } ], "title": "CVE-2020-27835" }, { "cve": "CVE-2020-28374", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28374" } ], "notes": [ { "category": "general", "text": "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28374", "url": "https://www.suse.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "SUSE Bug 1178372 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1178372" }, { "category": "external", "summary": "SUSE Bug 1178684 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1178684" }, { "category": "external", "summary": "SUSE Bug 1180676 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1180676" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "important" } ], "title": "CVE-2020-28374" }, { "cve": "CVE-2020-29568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29568" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29568", "url": "https://www.suse.com/security/cve/CVE-2020-29568" }, { "category": "external", "summary": "SUSE Bug 1179508 for CVE-2020-29568", "url": "https://bugzilla.suse.com/1179508" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "moderate" } ], "title": "CVE-2020-29568" }, { "cve": "CVE-2020-29569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29569" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29569", "url": "https://www.suse.com/security/cve/CVE-2020-29569" }, { "category": "external", "summary": "SUSE Bug 1179509 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1179509" }, { "category": "external", "summary": "SUSE Bug 1180008 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1180008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "important" } ], "title": "CVE-2020-29569" }, { "cve": "CVE-2020-36158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36158" } ], "notes": [ { "category": "general", "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36158", "url": "https://www.suse.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "SUSE Bug 1180559 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180559" }, { "category": "external", "summary": "SUSE Bug 1180562 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "important" } ], "title": "CVE-2020-36158" }, { "cve": "CVE-2021-0342", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0342" } ], "notes": [ { "category": "general", "text": "In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0342", "url": "https://www.suse.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "SUSE Bug 1180812 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180812" }, { "category": "external", "summary": "SUSE Bug 1180859 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "important" } ], "title": "CVE-2021-0342" }, { "cve": "CVE-2021-20177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20177" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20177", "url": "https://www.suse.com/security/cve/CVE-2021-20177" }, { "category": "external", "summary": "SUSE Bug 1180765 for CVE-2021-20177", "url": "https://bugzilla.suse.com/1180765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "moderate" } ], "title": "CVE-2021-20177" }, { "cve": "CVE-2021-3347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3347" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3347", "url": "https://www.suse.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "SUSE Bug 1181349 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181349" }, { "category": "external", "summary": "SUSE Bug 1181553 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181553" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "important" } ], "title": "CVE-2021-3347" }, { "cve": "CVE-2021-3348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3348" } ], "notes": [ { "category": "general", "text": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3348", "url": "https://www.suse.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "SUSE Bug 1181504 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181504" }, { "category": "external", "summary": "SUSE Bug 1181645 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.35.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.35.2.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.35.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T08:54:08Z", "details": "moderate" } ], "title": "CVE-2021-3348" } ] }
suse-su-2021:0354-1
Vulnerability from csaf_suse
Published
2021-02-09 15:39
Modified
2021-02-09 15:39
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
The following non-security bugs were fixed:
- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- bitmap: remove unused function declaration (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu: prevent double kfree ttm->sg (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/aspeed: Fix Kconfig warning & subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning & subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: * context changes
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: * context changes
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine->wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- module: delay kobject uevent until after module init call (bsc#1178631).
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr->ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base->next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
Patchnames
SUSE-2021-354,SUSE-SLE-Module-Basesystem-15-SP2-2021-354,SUSE-SLE-Module-Development-Tools-15-SP2-2021-354,SUSE-SLE-Module-Legacy-15-SP2-2021-354,SUSE-SLE-Module-Live-Patching-15-SP2-2021-354,SUSE-SLE-Product-HA-15-SP2-2021-354,SUSE-SLE-Product-WE-15-SP2-2021-354
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).\n- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).\n- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)\n- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).\n\nThe following non-security bugs were fixed:\n\n- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).\n- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).\n- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).\n- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).\n- ACPI: sysfs: Prefer \u0027compatible\u0027 modalias (git-fixes).\n- ALSA: doc: Fix reference to mixart.rst (git-fixes).\n- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).\n- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).\n- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).\n- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).\n- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).\n- ALSA: hda/realtek: Add two \u0027Intel Reference board\u0027 SSID in the ALC256 (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).\n- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).\n- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).\n- ALSA: hda/realtek - Modify Dell platform name (git-fixes).\n- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).\n- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).\n- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).\n- ALSA: hda/via: Add minimum mute flag (git-fixes).\n- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).\n- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).\n- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).\n- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).\n- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).\n- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).\n- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).\n- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).\n- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).\n- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).\n- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).\n- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).\n- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).\n- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).\n- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).\n- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).\n- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).\n- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).\n- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).\n- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).\n- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).\n- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).\n- arm64: pgtable: Fix pte_accessible() (bsc#1180130).\n- ASoC: ak4458: correct reset polarity (git-fixes).\n- ASoC: dapm: remove widget from dirty list on free (git-fixes).\n- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).\n- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).\n- bitmap: remove unused function declaration (git-fixes).\n- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).\n- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).\n- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).\n- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).\n- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).\n- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).\n- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).\n- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).\n- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).\n- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).\n- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).\n- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).\n- can: dev: prevent potential information leak in can_fill_info() (git-fixes).\n- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).\n- CDC-NCM: remove \u0027connected\u0027 log message (git-fixes).\n- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).\n- crypto: asym_tpm: correct zero out potential secrets (git-fixes).\n- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).\n- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).\n- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).\n- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).\n- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).\n- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).\n- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).\n- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).\n- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).\n- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).\n- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).\n- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:\n- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).\n- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).\n- drm/amd/display: Avoid MST manager resource leak (git-fixes).\n- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).\n- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).\n- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).\n- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).\n- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).\n- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).\n- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).\n- drm/amd/display: Increase timeout for DP Disable (git-fixes).\n- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amd/display: Retry AUX write when fail occurs (git-fixes).\n- drm/amd/display: Stop if retimer is not available (git-fixes).\n- drm/amd/display: update nv1x stutter latencies (git-fixes).\n- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).\n- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).\n- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).\n- drm/amdgpu: do not map BO in reserved region (git-fixes).\n- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).\n- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).\n- drm/amdgpu: increase atombios cmd timeout (git-fixes).\n- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).\n- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).\n- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).\n- drm/amdgpu: prevent double kfree ttm-\u003esg (git-fixes).\n- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).\n- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).\n- drm/amdkfd: fix a memory leak issue (git-fixes).\n- drm/amdkfd: Fix leak in dmabuf import (git-fixes).\n- drm/amdkfd: fix restore worker race condition (git-fixes).\n- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).\n- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).\n- drm/aspeed: Fix Kconfig warning \u0026 subsequent build errors (bsc#1152472)\n- drm/aspeed: Fix Kconfig warning \u0026 subsequent build errors (git-fixes).\n- drm/atomic: put state on error path (git-fixes).\n- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)\n- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).\n- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).\n- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).\n- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: \t* context changes\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).\n- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).\n- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).\n- drm/i915: Check for all subplatform bits (git-fixes).\n- drm/i915: clear the gpu reloc batch (git-fixes).\n- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: \t* context changes\n- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).\n- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).\n- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).\n- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).\n- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).\n- drm/i915: Force VT\u0027d workarounds when running as a guest OS (git-fixes).\n- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).\n- drm/i915/gt: Delay execlist processing for tgl (git-fixes).\n- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).\n- drm/i915/gt: Prevent use of engine-\u003ewa_ctx after error (git-fixes).\n- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).\n- drm/i915/gvt: return error when failing to take the module reference (git-fixes).\n- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).\n- drm/i915: Handle max_bpc==16 (git-fixes).\n- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).\n- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)\n- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).\n- drm/msm/a6xx: fix a potential overflow issue (git-fixes).\n- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).\n- drm/msm: add shutdown support for display platform_driver (git-fixes).\n- drm/msm: Disable preemption on all 5xx targets (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dpu: Fix scale params in plane validation (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).\n- drm/msm: fix leaks if initialization fails (git-fixes).\n- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).\n- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau: fix runtime pm imbalance on error (git-fixes).\n- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).\n- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).\n- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).\n- drm/nouveau/mmu: fix vram heap sizing (git-fixes).\n- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).\n- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).\n- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).\n- drm/omap: fix incorrect lock state (git-fixes).\n- drm/omap: fix possible object reference leak (git-fixes).\n- drm/panfrost: add amlogic reset quirk callback (git-fixes).\n- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- drm/scheduler: Avoid accessing freed bad job (git-fixes).\n- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)\n- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).\n- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).\n- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).\n- drm/sun4i: mixer: Extend regmap max_register (git-fixes).\n- drm/syncobj: Fix use-after-free (git-fixes).\n- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).\n- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).\n- drm/ttm: fix eviction valuable range check (git-fixes).\n- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)\n- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).\n- drm/tve200: Stabilize enable/disable (git-fixes).\n- drm/vc4: drv: Add error handding for bind (git-fixes).\n- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).\n- EDAC/amd64: Fix PCI component registration (bsc#1152489).\n- ehci: fix EHCI host controller initialization sequence (git-fixes).\n- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).\n- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 (\u0027kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\u0027)\n- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).\n- floppy: reintroduce O_NDELAY fix (boo#1181018).\n- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).\n- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).\n- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).\n- futex: Remove needless goto\u0027s (bsc#1149032).\n- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).\n- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).\n- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).\n- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).\n- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).\n- HID: logitech-dj: add the G602 receiver (git-fixes).\n- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).\n- HID: multitouch: do not filter mice nodes (git-fixes).\n- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).\n- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).\n- HID: wacom: Constify attribute_groups (git-fixes).\n- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).\n- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).\n- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).\n- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).\n- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).\n- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).\n- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).\n- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).\n- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).\n- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).\n- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).\n- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).\n- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).\n- iio: ad5504: Fix setting power-down state (git-fixes).\n- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).\n- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).\n- ionic: account for vlan tag len in rx buffer len (bsc#1167773).\n- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).\n- kdb: Fix pager search for multi-line strings (git-fixes).\n- kgdb: Drop malformed kernel doc comment (git-fixes).\n- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).\n- KVM: nVMX: Reload vmcs01 if getting vmcs12\u0027s pages fails (bsc#1181218).\n- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).\n- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).\n- leds: trigger: fix potential deadlock with libata (git-fixes).\n- lib/genalloc: fix the overflow when size is too big (git-fixes).\n- lib/string: remove unnecessary #undefs (git-fixes).\n- lockd: do not use interval-based rebinding over TCP (for-next).\n- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).\n- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).\n- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).\n- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).\n- media: dvb-usb: Fix use-after-free access (bsc#1181104).\n- media: gp8psk: initialize stats at power control logic (git-fixes).\n- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).\n- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).\n- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).\n- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).\n- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).\n- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).\n- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).\n- module: delay kobject uevent until after module init call (bsc#1178631).\n- mt7601u: fix kernel crash unplugging the device (git-fixes).\n- mt7601u: fix rx buffer refcounting (git-fixes).\n- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).\n- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).\n- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).\n- net: hns3: fix a phy loopback fail issue (bsc#1154353).\n- net: hns3: remove a misused pragma packed (bsc#1154353).\n- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).\n- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).\n- net/smc: cancel event worker during device removal (git-fixes).\n- net/smc: check for valid ib_client_data (git-fixes).\n- net/smc: fix cleanup for linkgroup setup failures (git-fixes).\n- net/smc: fix direct access to ib_gid_addr-\u003endev in smc_ib_determine_gid() (git-fixes).\n- net/smc: fix dmb buffer shortage (git-fixes).\n- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).\n- net/smc: fix sock refcounting in case of termination (git-fixes).\n- net/smc: fix valid DMBE buffer sizes (git-fixes).\n- net/smc: no peer ID in CLC decline for SMCD (git-fixes).\n- net/smc: remove freed buffer from list (git-fixes).\n- net/smc: reset sndbuf_desc if freed (git-fixes).\n- net/smc: set rx_off for SMCR explicitly (git-fixes).\n- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).\n- net/smc: transfer fasync_list in case of fallback (git-fixes).\n- net: sunrpc: Fix \u0027snprintf\u0027 return value check in \u0027do_xprt_debugfs\u0027 (for-next).\n- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).\n- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).\n- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).\n- NFC: fix possible resource leak (git-fixes).\n- NFC: fix resource leak when target index is invalid (git-fixes).\n- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).\n- nfs_common: need lock during iterate through the list (for-next).\n- nfsd4: readdirplus shouldn\u0027t return parent of export (git-fixes).\n- nfsd: Fix message level for normal termination (for-next).\n- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).\n- NFS: nfs_igrab_and_active must first reference the superblock (for-next).\n- NFS/pNFS: Fix a leak of the layout \u0027plh_outstanding\u0027 counter (for-next).\n- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).\n- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).\n- NFSv4.2: condition READDIR\u0027s mask for security label based on LSM state (for-next).\n- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).\n- nvme-multipath: fix bogus request queue reference put (bsc#1175389).\n- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).\n- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).\n- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).\n- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).\n- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).\n- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).\n- PM: hibernate: flush swap writer after marking (git-fixes).\n- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).\n- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).\n- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).\n- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).\n- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).\n- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).\n- power: vexpress: add suppress_bind_attrs to true (git-fixes).\n- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).\n- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).\n- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).\n- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).\n- r8169: work around power-saving bug on some chip versions (git-fixes).\n- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).\n- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).\n- Revive usb-audio Keep Interface mixer (bsc#1181014).\n- rtc: pl031: fix resource leak in pl031_probe (git-fixes).\n- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).\n- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).\n- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).\n- s390/dasd: fix list corruption of lcu list (git-fixes).\n- s390/dasd: fix list corruption of pavgroup group list (git-fixes).\n- s390/dasd: prevent inconsistent LCU device data (git-fixes).\n- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).\n- s390/qeth: consolidate online/offline code (git-fixes).\n- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).\n- s390/qeth: fix deadlock during recovery (git-fixes).\n- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).\n- s390/qeth: fix locking for discipline setup / removal (git-fixes).\n- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).\n- sched/fair: Check for idle core in wake_affine (git fixes (sched)).\n- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).\n- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).\n- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).\n- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).\n- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).\n- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).\n- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).\n- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).\n- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).\n- scsi: lpfc: Fix target reset failing (bsc#1180891).\n- scsi: lpfc: Fix vport create logging (bsc#1180891).\n- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).\n- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).\n- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).\n- scsi: lpfc: Simplify bool comparison (bsc#1180891).\n- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).\n- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).\n- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).\n- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).\n- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).\n- selftests: net: fib_tests: remove duplicate log test (git-fixes).\n- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).\n- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).\n- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).\n- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).\n- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).\n- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).\n- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).\n- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).\n- spi: cadence: cache reference clock rate during probe (git-fixes).\n- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).\n- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).\n- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).\n- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).\n- swiotlb: fix \u0027x86: Do not panic if can not alloc buffer for swiotlb\u0027 (git-fixes).\n- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).\n- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).\n- timers: Use only bucket expiry for base-\u003enext_expiry value (bsc#1181318).\n- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).\n- USB: cdc-acm: blacklist another IR Droid device (git-fixes).\n- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).\n- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).\n- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).\n- usb: dwc3: core: Properly default unspecified speed (git-fixes).\n- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).\n- usb: dwc3: Update soft-reset wait polling rate (git-fixes).\n- USB: ehci: fix an interrupt calltrace error (git-fixes).\n- usb: gadget: aspeed: fix stop dma register setting (git-fixes).\n- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).\n- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).\n- usb: gadget: enable super speed plus (git-fixes).\n- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).\n- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).\n- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).\n- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).\n- usb: gadget: select CONFIG_CRC32 (git-fixes).\n- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).\n- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).\n- USB: serial: option: add LongSung M5710 module support (git-fixes).\n- USB: serial: option: add Quectel EM160R-GL (git-fixes).\n- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).\n- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).\n- usb: udc: core: Use lock when write to soft_connect (git-fixes).\n- usb: usbip: vhci_hcd: protect shift size (git-fixes).\n- USB: usblp: fix DMA to stack (git-fixes).\n- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).\n- USB: yurex: fix control-URB timeout handling (git-fixes).\n- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).\n- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).\n- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).\n- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).\n- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).\n- video: fbdev: pvr2fb: initialize variables (git-fixes).\n- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).\n- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).\n- wil6210: select CONFIG_CRC32 (git-fixes).\n- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).\n- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).\n- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).\n- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).\n- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).\n- x86/mm: Fix leak of pmd ptlock (bsc#1152489).\n- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).\n- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).\n- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).\n- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).\n- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).\n- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).\n- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).\n- xen/privcmd: allow fetching resource sizes (bsc#1065600).\n- xfs: show the proper user quota options (bsc#1181538).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).\n- xhci: tegra: Delay for disabling LFPS detector (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-354,SUSE-SLE-Module-Basesystem-15-SP2-2021-354,SUSE-SLE-Module-Development-Tools-15-SP2-2021-354,SUSE-SLE-Module-Legacy-15-SP2-2021-354,SUSE-SLE-Module-Live-Patching-15-SP2-2021-354,SUSE-SLE-Product-HA-15-SP2-2021-354,SUSE-SLE-Product-WE-15-SP2-2021-354", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0354-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0354-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210354-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0354-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1163930", "url": "https://bugzilla.suse.com/1163930" }, { "category": "self", "summary": "SUSE Bug 1165545", "url": "https://bugzilla.suse.com/1165545" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1172355", "url": "https://bugzilla.suse.com/1172355" }, { "category": "self", "summary": "SUSE Bug 1175389", "url": "https://bugzilla.suse.com/1175389" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176831", "url": "https://bugzilla.suse.com/1176831" }, { "category": "self", "summary": "SUSE Bug 1176846", "url": "https://bugzilla.suse.com/1176846" }, { "category": "self", "summary": "SUSE Bug 1178142", "url": "https://bugzilla.suse.com/1178142" }, { "category": "self", "summary": "SUSE Bug 1178631", "url": "https://bugzilla.suse.com/1178631" }, { "category": "self", "summary": "SUSE Bug 1179142", "url": "https://bugzilla.suse.com/1179142" }, { "category": "self", "summary": "SUSE Bug 1179396", "url": "https://bugzilla.suse.com/1179396" }, { "category": "self", "summary": "SUSE Bug 1179508", "url": "https://bugzilla.suse.com/1179508" }, { "category": "self", "summary": "SUSE Bug 1179509", "url": "https://bugzilla.suse.com/1179509" }, { "category": "self", "summary": "SUSE Bug 1179567", "url": "https://bugzilla.suse.com/1179567" }, { "category": "self", "summary": "SUSE Bug 1179572", "url": "https://bugzilla.suse.com/1179572" }, { "category": "self", "summary": "SUSE Bug 1179575", "url": "https://bugzilla.suse.com/1179575" }, { "category": "self", "summary": "SUSE Bug 1179878", "url": "https://bugzilla.suse.com/1179878" }, { "category": "self", "summary": "SUSE Bug 1180008", "url": "https://bugzilla.suse.com/1180008" }, { "category": "self", "summary": "SUSE Bug 1180130", "url": "https://bugzilla.suse.com/1180130" }, { "category": "self", "summary": "SUSE Bug 1180264", "url": "https://bugzilla.suse.com/1180264" }, { "category": "self", "summary": "SUSE Bug 1180412", "url": "https://bugzilla.suse.com/1180412" }, { "category": "self", "summary": "SUSE Bug 1180759", "url": "https://bugzilla.suse.com/1180759" }, { "category": "self", "summary": "SUSE Bug 1180765", "url": "https://bugzilla.suse.com/1180765" }, { "category": "self", "summary": "SUSE Bug 1180773", "url": "https://bugzilla.suse.com/1180773" }, { "category": "self", "summary": "SUSE Bug 1180809", "url": "https://bugzilla.suse.com/1180809" }, { "category": "self", "summary": "SUSE Bug 1180812", "url": "https://bugzilla.suse.com/1180812" }, { "category": "self", "summary": "SUSE Bug 1180848", "url": "https://bugzilla.suse.com/1180848" }, { "category": "self", "summary": "SUSE Bug 1180859", "url": "https://bugzilla.suse.com/1180859" }, { "category": "self", "summary": "SUSE Bug 1180889", "url": "https://bugzilla.suse.com/1180889" }, { "category": "self", "summary": "SUSE Bug 1180891", "url": "https://bugzilla.suse.com/1180891" }, { "category": "self", "summary": "SUSE Bug 1180971", "url": "https://bugzilla.suse.com/1180971" }, { "category": "self", "summary": "SUSE Bug 1181014", "url": "https://bugzilla.suse.com/1181014" }, { "category": "self", "summary": "SUSE Bug 1181018", "url": "https://bugzilla.suse.com/1181018" }, { "category": "self", "summary": "SUSE Bug 1181077", "url": "https://bugzilla.suse.com/1181077" }, { "category": "self", "summary": "SUSE Bug 1181104", "url": "https://bugzilla.suse.com/1181104" }, { "category": "self", "summary": "SUSE Bug 1181148", "url": "https://bugzilla.suse.com/1181148" }, { "category": "self", "summary": "SUSE Bug 1181158", "url": "https://bugzilla.suse.com/1181158" }, { "category": "self", "summary": "SUSE Bug 1181161", "url": "https://bugzilla.suse.com/1181161" }, { "category": "self", "summary": "SUSE Bug 1181169", "url": "https://bugzilla.suse.com/1181169" }, { "category": "self", "summary": "SUSE Bug 1181203", "url": "https://bugzilla.suse.com/1181203" }, { "category": "self", "summary": "SUSE Bug 1181217", "url": "https://bugzilla.suse.com/1181217" }, { "category": "self", "summary": "SUSE Bug 1181218", "url": "https://bugzilla.suse.com/1181218" }, { "category": "self", "summary": "SUSE Bug 1181219", "url": "https://bugzilla.suse.com/1181219" }, { "category": "self", "summary": "SUSE Bug 1181220", "url": "https://bugzilla.suse.com/1181220" }, { "category": "self", "summary": "SUSE Bug 1181237", "url": "https://bugzilla.suse.com/1181237" }, { "category": "self", "summary": "SUSE Bug 1181318", "url": "https://bugzilla.suse.com/1181318" }, { "category": "self", "summary": "SUSE Bug 1181335", "url": "https://bugzilla.suse.com/1181335" }, { "category": "self", "summary": "SUSE Bug 1181346", "url": "https://bugzilla.suse.com/1181346" }, { "category": "self", "summary": "SUSE Bug 1181349", "url": "https://bugzilla.suse.com/1181349" }, { "category": "self", "summary": "SUSE Bug 1181425", "url": "https://bugzilla.suse.com/1181425" }, { "category": "self", "summary": "SUSE Bug 1181494", "url": "https://bugzilla.suse.com/1181494" }, { "category": "self", "summary": "SUSE Bug 1181504", "url": "https://bugzilla.suse.com/1181504" }, { "category": "self", "summary": "SUSE Bug 1181511", "url": "https://bugzilla.suse.com/1181511" }, { "category": "self", "summary": "SUSE Bug 1181538", "url": "https://bugzilla.suse.com/1181538" }, { "category": "self", "summary": "SUSE Bug 1181553", "url": "https://bugzilla.suse.com/1181553" }, { "category": "self", "summary": "SUSE Bug 1181584", "url": "https://bugzilla.suse.com/1181584" }, { "category": "self", "summary": "SUSE Bug 1181645", "url": "https://bugzilla.suse.com/1181645" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25211 page", "url": "https://www.suse.com/security/cve/CVE-2020-25211/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27835 page", "url": "https://www.suse.com/security/cve/CVE-2020-27835/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29568 page", "url": "https://www.suse.com/security/cve/CVE-2020-29568/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29569 page", "url": "https://www.suse.com/security/cve/CVE-2020-29569/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0342 page", "url": "https://www.suse.com/security/cve/CVE-2021-0342/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20177 page", "url": "https://www.suse.com/security/cve/CVE-2021-20177/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3347 page", "url": "https://www.suse.com/security/cve/CVE-2021-3347/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3348 page", "url": "https://www.suse.com/security/cve/CVE-2021-3348/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-02-09T15:39:23Z", "generator": { "date": "2021-02-09T15:39:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0354-1", "initial_release_date": "2021-02-09T15:39:23Z", "revision_history": [ { "date": "2021-02-09T15:39:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.49.2.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.49.2.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.49.2.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-24.49.2.aarch64", "product_id": "dlm-kmp-default-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.49.2.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.49.2.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.49.2.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-24.49.2.aarch64", "product_id": "gfs2-kmp-default-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.49.2.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.49.2.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-default-5.3.18-24.49.2.aarch64", "product_id": "kernel-default-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "product": { "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "product_id": "kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-default-devel-5.3.18-24.49.2.aarch64", "product_id": "kernel-default-devel-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-default-extra-5.3.18-24.49.2.aarch64", "product_id": "kernel-default-extra-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-24.49.2.aarch64", "product_id": "kernel-default-livepatch-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-obs-build-5.3.18-24.49.2.aarch64", "product_id": "kernel-obs-build-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-24.49.2.aarch64", "product_id": "kernel-obs-qa-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-preempt-5.3.18-24.49.2.aarch64", "product_id": "kernel-preempt-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-24.49.2.aarch64", "product_id": "kernel-preempt-devel-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-24.49.2.aarch64", "product_id": "kernel-preempt-extra-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.49.2.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.49.2.aarch64", "product": { "name": "kernel-syms-5.3.18-24.49.2.aarch64", "product_id": "kernel-syms-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.49.2.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-24.49.2.aarch64", "product_id": "kselftests-kmp-default-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.49.2.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.49.2.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.49.2.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.49.2.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-24.49.2.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.49.2.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.49.2.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.49.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-24.49.2.noarch", "product": { "name": "kernel-devel-5.3.18-24.49.2.noarch", "product_id": "kernel-devel-5.3.18-24.49.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-24.49.3.noarch", "product": { "name": "kernel-docs-5.3.18-24.49.3.noarch", "product_id": "kernel-docs-5.3.18-24.49.3.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-24.49.3.noarch", "product": { "name": "kernel-docs-html-5.3.18-24.49.3.noarch", "product_id": "kernel-docs-html-5.3.18-24.49.3.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-24.49.2.noarch", "product": { "name": "kernel-macros-5.3.18-24.49.2.noarch", "product_id": "kernel-macros-5.3.18-24.49.2.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-24.49.2.noarch", "product": { "name": "kernel-source-5.3.18-24.49.2.noarch", "product_id": "kernel-source-5.3.18-24.49.2.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-24.49.2.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-24.49.2.noarch", "product_id": "kernel-source-vanilla-5.3.18-24.49.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.49.2.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-24.49.2.ppc64le", "product_id": "dlm-kmp-default-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-debug-5.3.18-24.49.2.ppc64le", "product_id": "kernel-debug-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-24.49.2.ppc64le", "product_id": "kernel-debug-devel-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.49.2.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-default-5.3.18-24.49.2.ppc64le", "product_id": "kernel-default-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "product": { "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "product_id": "kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-24.49.2.ppc64le", "product_id": "kernel-default-devel-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-24.49.2.ppc64le", "product_id": "kernel-default-extra-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-24.49.2.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.49.2.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.49.2.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-24.49.2.ppc64le", "product_id": "kernel-obs-build-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-24.49.2.ppc64le", "product_id": "kernel-obs-qa-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.49.2.ppc64le", "product": { "name": "kernel-syms-5.3.18-24.49.2.ppc64le", "product_id": "kernel-syms-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.49.2.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-24.49.2.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-24.49.2.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-24.49.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.49.2.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-24.49.2.s390x", "product_id": "cluster-md-kmp-default-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.49.2.s390x", "product": { "name": "dlm-kmp-default-5.3.18-24.49.2.s390x", "product_id": "dlm-kmp-default-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.49.2.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-24.49.2.s390x", "product_id": "gfs2-kmp-default-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.49.2.s390x", "product": { "name": "kernel-default-5.3.18-24.49.2.s390x", "product_id": "kernel-default-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "product": { "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "product_id": "kernel-default-base-5.3.18-24.49.2.9.21.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.49.2.s390x", "product": { "name": "kernel-default-devel-5.3.18-24.49.2.s390x", "product_id": "kernel-default-devel-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.49.2.s390x", "product": { "name": "kernel-default-extra-5.3.18-24.49.2.s390x", "product_id": "kernel-default-extra-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.49.2.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-24.49.2.s390x", "product_id": "kernel-default-livepatch-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "product_id": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.49.2.s390x", "product": { "name": "kernel-obs-build-5.3.18-24.49.2.s390x", "product_id": "kernel-obs-build-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.49.2.s390x", "product": { "name": "kernel-obs-qa-5.3.18-24.49.2.s390x", "product_id": "kernel-obs-qa-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.49.2.s390x", "product": { "name": "kernel-syms-5.3.18-24.49.2.s390x", "product_id": "kernel-syms-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-24.49.2.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-24.49.2.s390x", "product_id": "kernel-zfcpdump-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.49.2.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-24.49.2.s390x", "product_id": "kselftests-kmp-default-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.49.2.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-24.49.2.s390x", "product_id": "ocfs2-kmp-default-5.3.18-24.49.2.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.49.2.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-24.49.2.s390x", "product_id": "reiserfs-kmp-default-5.3.18-24.49.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.49.2.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.49.2.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.49.2.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-24.49.2.x86_64", "product_id": "dlm-kmp-default-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.49.2.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.49.2.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.49.2.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-24.49.2.x86_64", "product_id": "gfs2-kmp-default-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.49.2.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.49.2.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-debug-5.3.18-24.49.2.x86_64", "product_id": "kernel-debug-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-24.49.2.x86_64", "product_id": "kernel-debug-devel-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.49.2.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-default-5.3.18-24.49.2.x86_64", "product_id": "kernel-default-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "product": { "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "product_id": "kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-24.49.2.9.21.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-default-devel-5.3.18-24.49.2.x86_64", "product_id": "kernel-default-devel-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-default-extra-5.3.18-24.49.2.x86_64", "product_id": "kernel-default-extra-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-24.49.2.x86_64", "product_id": "kernel-default-livepatch-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-24.49.2.x86_64", "product_id": "kernel-kvmsmall-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.49.2.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.49.2.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_49-preempt-1-5.3.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_49-preempt-1-5.3.2.x86_64", "product_id": "kernel-livepatch-5_3_18-24_49-preempt-1-5.3.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-obs-build-5.3.18-24.49.2.x86_64", "product_id": "kernel-obs-build-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-24.49.2.x86_64", "product_id": "kernel-obs-qa-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-preempt-5.3.18-24.49.2.x86_64", "product_id": "kernel-preempt-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-24.49.2.x86_64", "product_id": "kernel-preempt-devel-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-24.49.2.x86_64", "product_id": "kernel-preempt-extra-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.49.2.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.49.2.x86_64", "product": { "name": "kernel-syms-5.3.18-24.49.2.x86_64", "product_id": "kernel-syms-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.49.2.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-24.49.2.x86_64", "product_id": "kselftests-kmp-default-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.49.2.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.49.2.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.49.2.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.49.2.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-24.49.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.49.2.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.49.2.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.49.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64" }, "product_reference": "kernel-default-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x" }, "product_reference": "kernel-default-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64" }, "product_reference": "kernel-default-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x" }, "product_reference": "kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x" }, "product_reference": "kernel-default-devel-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.49.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch" }, "product_reference": "kernel-devel-5.3.18-24.49.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.49.2.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch" }, "product_reference": "kernel-macros-5.3.18-24.49.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.49.3.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch" }, "product_reference": "kernel-docs-5.3.18-24.49.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x" }, "product_reference": "kernel-obs-build-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.49.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch" }, "product_reference": "kernel-source-5.3.18-24.49.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x" }, "product_reference": "kernel-syms-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.49.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.49.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.49.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.49.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-24.49.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" }, "product_reference": "kernel-default-extra-5.3.18-24.49.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25211" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25211", "url": "https://www.suse.com/security/cve/CVE-2020-25211" }, { "category": "external", "summary": "SUSE Bug 1176395 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1176395" }, { "category": "external", "summary": "SUSE Bug 1192356 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1192356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T15:39:23Z", "details": "moderate" } ], "title": "CVE-2020-25211" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T15:39:23Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-27835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27835" } ], "notes": [ { "category": "general", "text": "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27835", "url": "https://www.suse.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "SUSE Bug 1179878 for CVE-2020-27835", "url": "https://bugzilla.suse.com/1179878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T15:39:23Z", "details": "moderate" } ], "title": "CVE-2020-27835" }, { "cve": "CVE-2020-29568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29568" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29568", "url": "https://www.suse.com/security/cve/CVE-2020-29568" }, { "category": "external", "summary": "SUSE Bug 1179508 for CVE-2020-29568", "url": "https://bugzilla.suse.com/1179508" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T15:39:23Z", "details": "moderate" } ], "title": "CVE-2020-29568" }, { "cve": "CVE-2020-29569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29569" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29569", "url": "https://www.suse.com/security/cve/CVE-2020-29569" }, { "category": "external", "summary": "SUSE Bug 1179509 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1179509" }, { "category": "external", "summary": "SUSE Bug 1180008 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1180008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T15:39:23Z", "details": "important" } ], "title": "CVE-2020-29569" }, { "cve": "CVE-2021-0342", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0342" } ], "notes": [ { "category": "general", "text": "In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0342", "url": "https://www.suse.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "SUSE Bug 1180812 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180812" }, { "category": "external", "summary": "SUSE Bug 1180859 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T15:39:23Z", "details": "important" } ], "title": "CVE-2021-0342" }, { "cve": "CVE-2021-20177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20177" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20177", "url": "https://www.suse.com/security/cve/CVE-2021-20177" }, { "category": "external", "summary": "SUSE Bug 1180765 for CVE-2021-20177", "url": "https://bugzilla.suse.com/1180765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T15:39:23Z", "details": "moderate" } ], "title": "CVE-2021-20177" }, { "cve": "CVE-2021-3347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3347" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3347", "url": "https://www.suse.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "SUSE Bug 1181349 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181349" }, { "category": "external", "summary": "SUSE Bug 1181553 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181553" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T15:39:23Z", "details": "important" } ], "title": "CVE-2021-3347" }, { "cve": "CVE-2021-3348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3348" } ], "notes": [ { "category": "general", "text": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3348", "url": "https://www.suse.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "SUSE Bug 1181504 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181504" }, { "category": "external", "summary": "SUSE Bug 1181645 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_49-default-1-5.3.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.49.2.9.21.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.49.3.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.49.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.49.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.49.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-09T15:39:23Z", "details": "moderate" } ], "title": "CVE-2021-3348" } ] }
suse-su-2021:0742-1
Vulnerability from csaf_suse
Published
2021-03-09 15:13
Modified
2021-03-09 15:13
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bug was fixed:
- CVE-2021-3348: Fixed a use-after-free read in nbd_queue_rq (bsc#1181504).
The following non-security bugs were fixed:
- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- block: fix use-after-free in disk_part_iter_next (bsc#1182610).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- BTRFS: Cleanup try_flush_qgroup (bsc#1182047).
- BTRFS: correctly calculate item size used when item key collision happens (bsc#1181996).
- BTRFS: correctly validate compression type (bsc#1182269).
- BTRFS: delete the ordered isize update code (bsc#1181998).
- BTRFS: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- BTRFS: do not set path->leave_spinning for truncate (bsc#1181998).
- BTRFS: factor out extent dropping code from hole punch handler (bsc#1182038).
- BTRFS: fix cloning range with a hole when using the NO_HOLES feature (bsc#1182038).
- BTRFS: fix data bytes_may_use underflow with fallocate due to failed quota reserve (bsc#1182130)
- BTRFS: fix ENOSPC errors, leading to transaction aborts, when cloning extents (bsc#1182038).
- BTRFS: fix hole extent items with a zero size after range cloning (bsc#1182038).
- BTRFS: fix lost i_size update after cloning inline extent (bsc#1181998).
- BTRFS: fix mount failure caused by race with umount (bsc#1182248).
- BTRFS: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- BTRFS: fix unexpected cow in run_delalloc_nocow (bsc#1181987).
- BTRFS: fix unexpected failure of nocow buffered writes after snapshotting when low on space (bsc#1181987).
- BTRFS: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- BTRFS: incremental send, fix file corruption when no-holes feature is enabled (bsc#1182184).
- BTRFS: Introduce extent_io_tree::owner to distinguish different io_trees (bsc#1181998).
- BTRFS: introduce per-inode file extent tree (bsc#1181998).
- BTRFS: prepare for extensions in compression options (bsc#1182269).
- BTRFS: prop: fix vanished compression property after failed set (bsc#1182269).
- BTRFS: prop: fix zstd compression parameter validation (bsc#1182269).
- BTRFS: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- BTRFS: replace all uses of btrfs_ordered_update_i_size (bsc#1181998).
- BTRFS: send, allow clone operations within the same file (bsc#1182173)
- BTRFS: send, do not issue unnecessary truncate operations (bsc#1182173)
- BTRFS: send, fix emission of invalid clone operations within the same file (bsc#1182173)
- BTRFS: send, fix incorrect file layout after hole punching beyond eof (bsc#1182173).
- BTRFS: send: fix invalid clone operations when cloning from the same file and root (bsc#1182173)
- BTRFS: send, fix missing truncate for inode with prealloc extent past eof (bsc#1182173).
- BTRFS: send, orphanize first all conflicting inodes when processing references (bsc#1182243 bsc#1182242).
- BTRFS: send, recompute reference path after orphanization of a directory (bsc#1182243).
- BTRFS: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- BTRFS: transaction: Avoid deadlock due to bad initialization timing of fs_info::journal_info (bsc#1181931).
- BTRFS: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- BTRFS: Use bd_dev to generate index when dev_state_hashtable add items (bsc#1181931).
- BTRFS: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1181998).
- BTRFS: use the file extent tree infrastructure (bsc#1181998).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- dm: avoid filesystem lookup in dm_get_dev_t() (bsc#1178049).
- Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- Fix unsynchronized access to sev members through svm_register_enc_region (bsc#1114648).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- fs: move I_DIRTY_INODE to fs.h (bsc#1182612).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernfs: deal with kernfs_fill_super() failures (bsc#1181809).
- KVM: apic: Flush TLB after APIC mode/address change if VPIDs are in use (bsc#1182302).
- KVM: Fix kABI for set_virtual_apic_mode (bsc#1182310).
- KVM: Fix kABI for tlb_flush (bsc#1182195).
- kvm-vmx-Basic-APIC-virtualization-controls-have-thre.patch: (bsc#1182310).
- KVM: VMX: check for existence of secondary exec controls before accessing (bsc#1182438).
- KVM: VMX: hide flexpriority from guest when disabled at the module level (bsc#1182448).
- kvm-vmx-Introduce-lapic_mode-enumeration.patch: (bsc#1182307).
- KVM: x86: emulate RDPID (bsc#1182182).
- KVM: x86: emulating RDPID failure shall return #UD rather than
- KVM: X86: introduce invalidate_gpa argument to tlb flush (bsc#1182195).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: pwc: Use correct device for DMA (git-fixes).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).
- net: bcmgenet: add support for ethtool rxnfc flows (git-fixes).
- net: bcmgenet: code movement (git-fixes).
- net: bcmgenet: fix mask check in bcmgenet_validate_flow() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use __be16 for htons(ETH_P_IP) (git-fixes).
- net: bcmgenet: Use correct I/O accessors (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- nvme-multipath: Early exit if no path is available (git-fixes).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- quota: Fix error codes in v2_read_file_info() (bsc#1182652).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- reset: hisilicon: correct vendor prefix (git-fixes).
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- s390/pci: adaptation of iommu to multifunction (bsc#1179612).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: target: Fix truncated PR-in ReadKeys response (bsc#1182590).
- scsi: target: fix unmap_zeroes_data boolean initialisation (bsc#1163617).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- tools lib traceevent: Fix 'robust' test of do_generate_dynamic_list_file (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: musb: Fix runtime PM race in mUSB_queue_resume_work (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1179612).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1114648).
- x86/efistub: Disable paging at mixed mode entry (bsc#1114648).
- x86/entry/64/compat: Fix 'x86/entry/64/compat: Preserve r8-r11 in int $0x80' (bsc#1114648).
- x86/entry/64/compat: Preserve r8-r11 in int $0x80 (bsc#1114648).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1114648).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1114648).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).
Patchnames
SUSE-2021-742,SUSE-SLE-HA-12-SP5-2021-742,SUSE-SLE-Live-Patching-12-SP5-2021-742,SUSE-SLE-SDK-12-SP5-2021-742,SUSE-SLE-SERVER-12-SP5-2021-742,SUSE-SLE-WE-12-SP5-2021-742
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bug was fixed:\n\n- CVE-2021-3348: Fixed a use-after-free read in nbd_queue_rq (bsc#1181504).\n\nThe following non-security bugs were fixed:\n\n- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).\n- ACPI: property: Fix fwnode string properties matching (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).\n- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).\n- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)\n- ASoC: cs42l56: fix up error handling in probe (git-fixes).\n- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).\n- block: fix use-after-free in disk_part_iter_next (bsc#1182610).\n- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- Bluetooth: drop HCI device reference before return (git-fixes).\n- Bluetooth: Fix initializing response id after clearing struct (git-fixes).\n- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).\n- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).\n- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).\n- BTRFS: Cleanup try_flush_qgroup (bsc#1182047).\n- BTRFS: correctly calculate item size used when item key collision happens (bsc#1181996).\n- BTRFS: correctly validate compression type (bsc#1182269).\n- BTRFS: delete the ordered isize update code (bsc#1181998).\n- BTRFS: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- BTRFS: do not set path-\u003eleave_spinning for truncate (bsc#1181998).\n- BTRFS: factor out extent dropping code from hole punch handler (bsc#1182038).\n- BTRFS: fix cloning range with a hole when using the NO_HOLES feature (bsc#1182038).\n- BTRFS: fix data bytes_may_use underflow with fallocate due to failed quota reserve (bsc#1182130)\n- BTRFS: fix ENOSPC errors, leading to transaction aborts, when cloning extents (bsc#1182038).\n- BTRFS: fix hole extent items with a zero size after range cloning (bsc#1182038).\n- BTRFS: fix lost i_size update after cloning inline extent (bsc#1181998).\n- BTRFS: fix mount failure caused by race with umount (bsc#1182248).\n- BTRFS: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).\n- BTRFS: fix unexpected cow in run_delalloc_nocow (bsc#1181987).\n- BTRFS: fix unexpected failure of nocow buffered writes after snapshotting when low on space (bsc#1181987).\n- BTRFS: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- BTRFS: incremental send, fix file corruption when no-holes feature is enabled (bsc#1182184).\n- BTRFS: Introduce extent_io_tree::owner to distinguish different io_trees (bsc#1181998).\n- BTRFS: introduce per-inode file extent tree (bsc#1181998).\n- BTRFS: prepare for extensions in compression options (bsc#1182269).\n- BTRFS: prop: fix vanished compression property after failed set (bsc#1182269).\n- BTRFS: prop: fix zstd compression parameter validation (bsc#1182269).\n- BTRFS: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- BTRFS: replace all uses of btrfs_ordered_update_i_size (bsc#1181998).\n- BTRFS: send, allow clone operations within the same file (bsc#1182173)\n- BTRFS: send, do not issue unnecessary truncate operations (bsc#1182173)\n- BTRFS: send, fix emission of invalid clone operations within the same file (bsc#1182173)\n- BTRFS: send, fix incorrect file layout after hole punching beyond eof (bsc#1182173).\n- BTRFS: send: fix invalid clone operations when cloning from the same file and root (bsc#1182173)\n- BTRFS: send, fix missing truncate for inode with prealloc extent past eof (bsc#1182173).\n- BTRFS: send, orphanize first all conflicting inodes when processing references (bsc#1182243 bsc#1182242).\n- BTRFS: send, recompute reference path after orphanization of a directory (bsc#1182243).\n- BTRFS: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- BTRFS: transaction: Avoid deadlock due to bad initialization timing of fs_info::journal_info (bsc#1181931).\n- BTRFS: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).\n- BTRFS: Use bd_dev to generate index when dev_state_hashtable add items (bsc#1181931).\n- BTRFS: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1181998).\n- BTRFS: use the file extent tree infrastructure (bsc#1181998).\n- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).\n- dm: avoid filesystem lookup in dm_get_dev_t() (bsc#1178049).\n- Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).\n- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 (\u0027kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.\u0027)\n- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).\n- ext4: fix a memory leak of ext4_free_data (bsc#1182447).\n- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).\n- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).\n- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).\n- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).\n- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).\n- Fix unsynchronized access to sev members through svm_register_enc_region (bsc#1114648).\n- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).\n- fs: move I_DIRTY_INODE to fs.h (bsc#1182612). \n- HID: core: detect and skip invalid inputs to snto32() (git-fixes).\n- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).\n- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).\n- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).\n- ibmvnic: device remove has higher precedence over reset (bsc#1065729).\n- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).\n- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).\n- ibmvnic: serialize access to work queue on remove (bsc#1065729).\n- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).\n- Input: elo - fix an error code in elo_connect() (git-fixes).\n- Input: joydev - prevent potential read overflow in ioctl (git-fixes).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).\n- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 (\u0027rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).\u0027)\n- kernfs: deal with kernfs_fill_super() failures (bsc#1181809).\n- KVM: apic: Flush TLB after APIC mode/address change if VPIDs are in use (bsc#1182302).\n- KVM: Fix kABI for set_virtual_apic_mode (bsc#1182310).\n- KVM: Fix kABI for tlb_flush (bsc#1182195).\n- kvm-vmx-Basic-APIC-virtualization-controls-have-thre.patch: (bsc#1182310).\n- KVM: VMX: check for existence of secondary exec controls before accessing (bsc#1182438).\n- KVM: VMX: hide flexpriority from guest when disabled at the module level (bsc#1182448).\n- kvm-vmx-Introduce-lapic_mode-enumeration.patch: (bsc#1182307).\n- KVM: x86: emulate RDPID (bsc#1182182).\n- KVM: x86: emulating RDPID failure shall return #UD rather than\n- KVM: X86: introduce invalidate_gpa argument to tlb flush (bsc#1182195).\n- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).\n- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).\n- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).\n- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).\n- media: media/pci: Fix memleak in empress_init (git-fixes).\n- media: pwc: Use correct device for DMA (git-fixes).\n- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).\n- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).\n- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).\n- media: vsp1: Fix an error handling path in the probe function (git-fixes).\n- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).\n- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).\n- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).\n- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).\n- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).\n- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).\n- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).\n- net: bcmgenet: add support for ethtool rxnfc flows (git-fixes).\n- net: bcmgenet: code movement (git-fixes).\n- net: bcmgenet: fix mask check in bcmgenet_validate_flow() (git-fixes).\n- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).\n- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).\n- net: bcmgenet: set Rx mode before starting netif (git-fixes).\n- net: bcmgenet: use __be16 for htons(ETH_P_IP) (git-fixes).\n- net: bcmgenet: Use correct I/O accessors (git-fixes).\n- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854).\n- net: moxa: Fix a potential double \u0027free_irq()\u0027 (git-fixes).\n- net: sun: fix missing release regions in cas_init_one() (git-fixes).\n- nvme-multipath: Early exit if no path is available (git-fixes).\n- objtool: Do not fail on missing symbol table (bsc#1169514).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).\n- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).\n- powerpc: Fix alignment bug within the init sections (bsc#1065729).\n- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).\n- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).\n- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).\n- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).\n- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).\n- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).\n- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).\n- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).\n- quota: Fix error codes in v2_read_file_info() (bsc#1182652).\n- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).\n- quota: Sanity-check quota file headers on load (bsc#1182461).\n- regulator: axp20x: Fix reference cout leak (git-fixes).\n- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).\n- reset: hisilicon: correct vendor prefix (git-fixes).\n- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)\n- s390/pci: adaptation of iommu to multifunction (bsc#1179612).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).\n- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).\n- scsi: target: Fix truncated PR-in ReadKeys response (bsc#1182590).\n- scsi: target: fix unmap_zeroes_data boolean initialisation (bsc#1163617).\n- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).\n- tools lib traceevent: Fix \u0027robust\u0027 test of do_generate_dynamic_list_file (git-fixes).\n- tpm_tis: Clean up locality release (git-fixes).\n- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).\n- tracing: Check length before giving out the filter buffer (git-fixes).\n- tracing: Do not count ftrace events in top level enable output (git-fixes).\n- USB: cdc-acm: blacklist another IR Droid device (git-fixes).\n- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).\n- USB: dwc2: Make \u0027trimming xfer length\u0027 a debug message (git-fixes).\n- USB: musb: Fix runtime PM race in mUSB_queue_resume_work (git-fixes).\n- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).\n- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).\n- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).\n- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).\n- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).\n- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).\n- USB: serial: option: add LongSung M5710 module support (git-fixes).\n- USB: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).\n- USB: usblp: fix DMA to stack (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1179612).\n- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).\n- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).\n- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1114648).\n- x86/efistub: Disable paging at mixed mode entry (bsc#1114648).\n- x86/entry/64/compat: Fix \u0027x86/entry/64/compat: Preserve r8-r11 in int $0x80\u0027 (bsc#1114648).\n- x86/entry/64/compat: Preserve r8-r11 in int $0x80 (bsc#1114648).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1114648).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1114648).\n- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).\n- xhci: fix bounce buffer usage for non-sg list case (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-742,SUSE-SLE-HA-12-SP5-2021-742,SUSE-SLE-Live-Patching-12-SP5-2021-742,SUSE-SLE-SDK-12-SP5-2021-742,SUSE-SLE-SERVER-12-SP5-2021-742,SUSE-SLE-WE-12-SP5-2021-742", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0742-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0742-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210742-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0742-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008460.html" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1078720", "url": "https://bugzilla.suse.com/1078720" }, { "category": "self", "summary": "SUSE Bug 1081134", "url": "https://bugzilla.suse.com/1081134" }, { "category": "self", "summary": "SUSE Bug 1084610", "url": "https://bugzilla.suse.com/1084610" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1163617", "url": "https://bugzilla.suse.com/1163617" }, { "category": "self", "summary": "SUSE Bug 1163930", "url": "https://bugzilla.suse.com/1163930" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1176855", "url": "https://bugzilla.suse.com/1176855" }, { "category": "self", "summary": "SUSE Bug 1177440", "url": "https://bugzilla.suse.com/1177440" }, { "category": "self", "summary": "SUSE Bug 1178049", "url": "https://bugzilla.suse.com/1178049" }, { "category": "self", "summary": "SUSE Bug 1179082", "url": "https://bugzilla.suse.com/1179082" }, { "category": "self", "summary": "SUSE Bug 1179142", "url": "https://bugzilla.suse.com/1179142" }, { "category": "self", "summary": "SUSE Bug 1179612", "url": "https://bugzilla.suse.com/1179612" }, { "category": "self", "summary": "SUSE Bug 1179709", "url": "https://bugzilla.suse.com/1179709" }, { "category": "self", "summary": "SUSE Bug 1180058", "url": "https://bugzilla.suse.com/1180058" }, { "category": "self", "summary": "SUSE Bug 1181346", "url": "https://bugzilla.suse.com/1181346" }, { "category": "self", "summary": "SUSE Bug 1181504", "url": "https://bugzilla.suse.com/1181504" }, { "category": "self", "summary": "SUSE Bug 1181574", "url": "https://bugzilla.suse.com/1181574" }, { "category": "self", "summary": "SUSE Bug 1181671", "url": "https://bugzilla.suse.com/1181671" }, { "category": "self", "summary": "SUSE Bug 1181809", "url": "https://bugzilla.suse.com/1181809" }, { "category": "self", "summary": "SUSE Bug 1181854", "url": "https://bugzilla.suse.com/1181854" }, { "category": "self", "summary": "SUSE Bug 1181896", "url": "https://bugzilla.suse.com/1181896" }, { "category": "self", "summary": "SUSE Bug 1181931", "url": "https://bugzilla.suse.com/1181931" }, { "category": "self", "summary": "SUSE Bug 1181960", "url": "https://bugzilla.suse.com/1181960" }, { "category": "self", "summary": "SUSE Bug 1181985", "url": "https://bugzilla.suse.com/1181985" }, { "category": "self", "summary": "SUSE Bug 1181987", "url": "https://bugzilla.suse.com/1181987" }, { "category": "self", "summary": "SUSE Bug 1181996", "url": "https://bugzilla.suse.com/1181996" }, { "category": "self", "summary": "SUSE Bug 1181998", "url": "https://bugzilla.suse.com/1181998" }, { "category": "self", "summary": "SUSE Bug 1182038", "url": "https://bugzilla.suse.com/1182038" }, { "category": "self", "summary": "SUSE Bug 1182047", "url": "https://bugzilla.suse.com/1182047" }, { "category": "self", "summary": "SUSE Bug 1182118", "url": "https://bugzilla.suse.com/1182118" }, { "category": "self", "summary": "SUSE Bug 1182130", "url": "https://bugzilla.suse.com/1182130" }, { "category": "self", "summary": "SUSE Bug 1182140", "url": "https://bugzilla.suse.com/1182140" }, { "category": "self", "summary": "SUSE Bug 1182171", "url": "https://bugzilla.suse.com/1182171" }, { "category": "self", "summary": "SUSE Bug 1182173", "url": "https://bugzilla.suse.com/1182173" }, { "category": "self", "summary": "SUSE Bug 1182175", "url": "https://bugzilla.suse.com/1182175" }, { "category": "self", "summary": "SUSE Bug 1182182", "url": "https://bugzilla.suse.com/1182182" }, { "category": "self", "summary": "SUSE Bug 1182184", "url": "https://bugzilla.suse.com/1182184" }, { "category": "self", "summary": "SUSE Bug 1182195", "url": "https://bugzilla.suse.com/1182195" }, { "category": "self", "summary": "SUSE Bug 1182242", "url": "https://bugzilla.suse.com/1182242" }, { "category": "self", "summary": "SUSE Bug 1182243", "url": "https://bugzilla.suse.com/1182243" }, { "category": "self", "summary": "SUSE Bug 1182248", "url": "https://bugzilla.suse.com/1182248" }, { "category": "self", "summary": "SUSE Bug 1182269", "url": "https://bugzilla.suse.com/1182269" }, { "category": "self", "summary": "SUSE Bug 1182302", "url": "https://bugzilla.suse.com/1182302" }, { "category": "self", "summary": "SUSE Bug 1182307", "url": "https://bugzilla.suse.com/1182307" }, { "category": "self", "summary": "SUSE Bug 1182310", "url": "https://bugzilla.suse.com/1182310" }, { "category": "self", "summary": "SUSE Bug 1182438", "url": "https://bugzilla.suse.com/1182438" }, { "category": "self", "summary": "SUSE Bug 1182447", "url": "https://bugzilla.suse.com/1182447" }, { "category": "self", "summary": "SUSE Bug 1182448", "url": "https://bugzilla.suse.com/1182448" }, { "category": "self", "summary": "SUSE Bug 1182449", "url": "https://bugzilla.suse.com/1182449" }, { "category": "self", "summary": "SUSE Bug 1182460", "url": "https://bugzilla.suse.com/1182460" }, { "category": "self", "summary": "SUSE Bug 1182461", "url": "https://bugzilla.suse.com/1182461" }, { "category": "self", "summary": "SUSE Bug 1182462", "url": "https://bugzilla.suse.com/1182462" }, { "category": "self", "summary": "SUSE Bug 1182463", "url": "https://bugzilla.suse.com/1182463" }, { "category": "self", "summary": "SUSE Bug 1182464", "url": "https://bugzilla.suse.com/1182464" }, { "category": "self", "summary": "SUSE Bug 1182465", "url": "https://bugzilla.suse.com/1182465" }, { "category": "self", "summary": "SUSE Bug 1182466", "url": "https://bugzilla.suse.com/1182466" }, { "category": "self", "summary": "SUSE Bug 1182560", "url": "https://bugzilla.suse.com/1182560" }, { "category": "self", "summary": "SUSE Bug 1182561", "url": "https://bugzilla.suse.com/1182561" }, { "category": "self", "summary": "SUSE Bug 1182571", "url": "https://bugzilla.suse.com/1182571" }, { "category": "self", "summary": "SUSE Bug 1182590", "url": "https://bugzilla.suse.com/1182590" }, { "category": "self", "summary": "SUSE Bug 1182610", "url": "https://bugzilla.suse.com/1182610" }, { "category": "self", "summary": "SUSE Bug 1182612", "url": "https://bugzilla.suse.com/1182612" }, { "category": "self", "summary": "SUSE Bug 1182650", "url": "https://bugzilla.suse.com/1182650" }, { "category": "self", "summary": "SUSE Bug 1182652", "url": "https://bugzilla.suse.com/1182652" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3348 page", "url": "https://www.suse.com/security/cve/CVE-2021-3348/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-03-09T15:13:52Z", "generator": { "date": "2021-03-09T15:13:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0742-1", "initial_release_date": "2021-03-09T15:13:52Z", "revision_history": [ { "date": "2021-03-09T15:13:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.63.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.63.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.63.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.63.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.63.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.63.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.63.1.aarch64", "product_id": "kernel-default-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.63.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.63.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.63.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.63.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.63.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.63.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.63.1.aarch64", "product_id": "kernel-syms-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.63.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.63.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.63.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.63.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.63.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.63.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.63.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.63.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.63.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.63.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.63.1.noarch", "product_id": "kernel-devel-4.12.14-122.63.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.63.1.noarch", "product": { "name": "kernel-docs-4.12.14-122.63.1.noarch", "product_id": "kernel-docs-4.12.14-122.63.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.63.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.63.1.noarch", "product_id": "kernel-docs-html-4.12.14-122.63.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.63.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.63.1.noarch", "product_id": "kernel-macros-4.12.14-122.63.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.63.1.noarch", "product": { "name": "kernel-source-4.12.14-122.63.1.noarch", "product_id": "kernel-source-4.12.14-122.63.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.63.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.63.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.63.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.63.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.63.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.63.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.63.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.63.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.63.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.63.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.63.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.63.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.63.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.63.1.ppc64le", "product_id": "kernel-default-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.63.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.63.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.63.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.63.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.63.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.63.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.63.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.63.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.63.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.63.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.63.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.63.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.63.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.63.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.63.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.63.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.63.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.63.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.63.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.63.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.63.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.63.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.63.1.s390x", "product": { "name": "kernel-default-4.12.14-122.63.1.s390x", "product_id": "kernel-default-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.63.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.63.1.s390x", "product_id": "kernel-default-base-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.63.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.63.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.63.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.63.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.63.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.63.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.63.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.63.1.s390x", "product_id": "kernel-default-man-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.63.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.63.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.63.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.63.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.63.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.63.1.s390x", "product_id": "kernel-syms-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.63.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.63.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.63.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.63.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.63.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.63.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.63.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.63.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.63.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.63.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x", "product_id": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.63.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.63.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.63.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.63.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.63.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.63.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.63.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.63.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.63.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.63.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.63.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.63.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.63.1.x86_64", "product_id": "kernel-debug-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.63.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.63.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.63.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.63.1.x86_64", "product_id": "kernel-default-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.63.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.63.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.63.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.63.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.63.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.63.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.63.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.63.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.63.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.63.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.63.1.x86_64", "product_id": "kernel-syms-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.63.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.63.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.63.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.63.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.63.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.63.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.63.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.63.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.63.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.63.1.noarch" }, "product_reference": "kernel-docs-4.12.14-122.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.63.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.63.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.63.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.63.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.63.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.63.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.63.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.63.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.63.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3348" } ], "notes": [ { "category": "general", "text": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.63.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3348", "url": "https://www.suse.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "SUSE Bug 1181504 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181504" }, { "category": "external", "summary": "SUSE Bug 1181645 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.63.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.63.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.63.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-03-09T15:13:52Z", "details": "moderate" } ], "title": "CVE-2021-3348" } ] }
suse-su-2021:0532-1
Vulnerability from csaf_suse
Published
2021-02-19 16:29
Modified
2021-02-19 16:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
The following non-security bugs were fixed:
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ASoC: Intel: haswell: Add missing pm_ops (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- EDAC/amd64: Fix PCI component registration (bsc#1112178).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (bsc#1103991).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180912).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (bsc#1181230).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (git-fixes).
- NFS: nfs_igrab_and_active must first reference the superblock (git-fixes).
- NFS: switch nfsiod to be an UNBOUND workqueue (git-fixes).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (git-fixes).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1103992).
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1050244 ).
- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1104742).
- RDMA/cma: Do not overwrite sgid_attr after device is released (bsc#1103992).
- RDMA/core: Ensure security pkey modify is not lost (bsc#1046306 ).
- RDMA/core: Fix pkey and port assignment in get_new_pps (bsc#1046306).
- RDMA/core: Fix protection fault in get_pkey_idx_qp_list (bsc#1046306).
- RDMA/core: Fix reported speed and width (bsc#1046306 ).
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1103992).
- RDMA/core: Fix use of logical OR in get_new_pps (bsc#1046306 ).
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1104427).
- RDMA/hns: Bugfix for slab-out-of-bounds when unloading hip08 driver (bsc#1104427).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (bsc#1104427 bsc#1126206).
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1104427 ).
- RDMA/hns: bugfix for slab-out-of-bounds when loading hip08 driver (bsc#1104427).
- RDMA/iw_cxgb4: Fix incorrect function parameters (bsc#1136348 jsc#SLE-4684).
- RDMA/iw_cxgb4: initiate CLOSE when entering TERM (bsc#1136348 jsc#SLE-4684).
- RDMA/mlx5: Add init2init as a modify command (bsc#1103991 ).
- RDMA/mlx5: Fix typo in enum name (bsc#1103991).
- RDMA/mlx5: Fix wrong free of blue flame register on error (bsc#1103991).
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1050545 ).
- SUNRPC: cache: ignore timestamp written to 'flush' file (bsc#1178036).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- __netif_receive_skb_core: pass skb by reference (bsc#1109837).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- bnxt_en: Do not query FW when netif_running() is false (bsc#1086282).
- bnxt_en: Fix accumulation of bp->net_stats_prev (bsc#1104745 ).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (bsc#1104745).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bnxt_en: Reset rings if ring reservation fails during open() (bsc#1086282).
- bnxt_en: fix HWRM error when querying VF temperature (bsc#1104745).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (bsc#1050242 ).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: return proper error codes in bnxt_show_temp (bsc#1104745).
- bonding: set dev->needed_headroom in bond_setup_by_slave() (git-fixes).
- btrfs: add a flag to iterate_inodes_from_logical to find all extent refs for uncompressed extents (bsc#1174206).
- btrfs: add a flags argument to LOGICAL_INO and call it LOGICAL_INO_V2 (bsc#1174206).
- btrfs: increase output size for LOGICAL_INO_V2 ioctl (bsc#1174206).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- chelsio/chtls: correct function return and return type (bsc#1104270).
- chelsio/chtls: correct netdevice for vlan interface (bsc#1104270 ).
- chelsio/chtls: fix a double free in chtls_setkey() (bsc#1104270 ).
- chelsio/chtls: fix always leaking ctrl_skb (bsc#1104270 ).
- chelsio/chtls: fix deadlock issue (bsc#1104270).
- chelsio/chtls: fix memory leaks caused by a race (bsc#1104270 ).
- chelsio/chtls: fix memory leaks in CPL handlers (bsc#1104270 ).
- chelsio/chtls: fix panic during unload reload chtls (bsc#1104270 ).
- chelsio/chtls: fix socket lock (bsc#1104270).
- chelsio/chtls: fix tls record info to user (bsc#1104270 ).
- chtls: Added a check to avoid NULL pointer dereference (bsc#1104270).
- chtls: Fix chtls resources release sequence (bsc#1104270 ).
- chtls: Fix hardware tid leak (bsc#1104270).
- chtls: Remove invalid set_tcb call (bsc#1104270).
- chtls: Replace skb_dequeue with skb_peek (bsc#1104270 ).
- cpumap: Avoid warning when CONFIG_DEBUG_PER_CPU_MAPS is enabled (bsc#1109837).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4/cxgb4vf: fix flow control display for auto negotiation (bsc#1046540 bsc#1046542).
- cxgb4: fix SGE queue dump destination buffer context (bsc#1073513).
- cxgb4: fix adapter crash due to wrong MC size (bsc#1073513).
- cxgb4: fix all-mask IP address comparison (bsc#1064802 bsc#1066129).
- cxgb4: fix large delays in PTP synchronization (bsc#1046540 bsc#1046648).
- cxgb4: fix the panic caused by non smac rewrite (bsc#1064802 bsc#1066129).
- cxgb4: fix thermal zone device registration (bsc#1104279 bsc#1104277).
- cxgb4: fix throughput drop during Tx backpressure (bsc#1127354 bsc#1127371).
- cxgb4: move DCB version extern to header file (bsc#1104279 ).
- cxgb4: remove cast when saving IPv4 partial checksum (bsc#1074220).
- cxgb4: set up filter action after rewrites (bsc#1064802 bsc#1066129).
- cxgb4: use correct type for all-mask IP address comparison (bsc#1064802 bsc#1066129).
- cxgb4: use unaligned conversion for fetching timestamp (bsc#1046540 bsc#1046648).
- dm: avoid filesystem lookup in dm_get_dev_t() (bsc#1178049).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- docs: Fix reST markup when linking to sections (git-fixes).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1113956)
- drm/amdkfd: Put ACPI table after using it (bsc#1129770) Backporting changes: * context changes
- drm/atomic: put state on error path (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: Clear the repeater bit on HDCP disable (bsc#1112178)
- drm/i915: Fix sha_text population code (bsc#1112178)
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1129770)
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1129770)
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1129770)
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1129770)
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1112178)
- drm: sun4i: hdmi: Fix inverted HPD result (bsc#1112178)
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1112178)
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: avoid premature Rx buffer reuse (bsc#1111981).
- igb: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: fix link speed advertising (jsc#SLE-4799).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181260, jsc#ECO-3191).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181260, jsc#ECO-3191).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (bsc#1109837).
- ixgbe: avoid premature Rx buffer reuse (bsc#1109837 ).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181260, jsc#ECO-3191).
- kernfs: deal with kernfs_fill_super() failures (bsc#1181809).
- lockd: do not use interval-based rebinding over TCP (git-fixes).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).
- md/raid10: initialize r10_bio->read_slot before use (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (git-fixes).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (bsc#1112374).
- mlxsw: spectrum: Do not modify cloned SKBs during xmit (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (bsc#1112374).
- mlxsw: switchx2: Do not modify cloned SKBs during xmit (git-fixes).
- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/hotplug)).
- mm/page_alloc: fix watchdog soft lockups during set_zone_contiguous() (git fixes (mm/pgalloc)).
- mm/rmap: map_pte() was not handling private ZONE_DEVICE page properly (git fixes (mm/hmm)).
- mm/slab: use memzero_explicit() in kzfree() (git fixes (mm/slab)).
- mm: do not wake kswapd prematurely when watermark boosting is disabled (git fixes (mm/vmscan)).
- mm: hwpoison: disable memory error handling on 1GB hugepage (git fixes (mm/hwpoison)).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).
- net/af_iucv: always register net_device notifier (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179563 LTC#190108).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net/filter: Permit reading NET in load_bytes_relative when MAC not set (bsc#1109837).
- net/liquidio: Delete driver version assignment (git-fixes).
- net/liquidio: Delete non-working LIQUIDIO_PACKAGE check (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (git-fixes).
- net/mlx5: Add handling of port type in rule deletion (bsc#1103991).
- net/mlx5: Fix memory leak on flow table creation error flow (bsc#1046305).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (bsc#1046305).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (bsc#1075020).
- net/mlx5e: TX, Fix consumer index of error cqe dump (bsc#1103990 ).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (bsc#1103990).
- net/sched: act_tunnel_key: fix OOB write in case of IPv6 ERSPAN tunnels (bsc#1109837).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: receive pending data after RCV_SHUTDOWN (git-fixes).
- net/smc: receive returns without data (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: reapply manual settings to the PHY (git-fixes).
- net: broadcom/bcmsysport: Fix signedness in bcm_sysport_probe() (git-fixes).
- net: cbs: Fix software cbs to consider packet sending time (bsc#1109837).
- net: dsa: LAN9303: select REGMAP when LAN9303 enable (git-fixes).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: stmmac: Fix signedness bug in ipq806x_gmac_of_parse() (git-fixes).
- net: freescale: fec: Fix ethtool -d runtime PM (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (bsc#1104353).
- net: hns3: add compatible handling for command HCLGE_OPC_PF_RST_DONE (git-fixes).
- net: hns3: add management table after IMP reset (bsc#1104353 ).
- net: hns3: check reset interrupt status when reset fails (git-fixes).
- net: hns3: clear reset interrupt status in hclge_irq_handle() (git-fixes).
- net: hns3: fix a TX timeout issue (bsc#1104353).
- net: hns3: fix a wrong reset interrupt status mask (git-fixes).
- net: hns3: fix error VF index when setting VLAN offload (bsc#1104353).
- net: hns3: fix error handling for desc filling (bsc#1104353 ).
- net: hns3: fix for not calculating TX BD send size correctly (bsc#1126390).
- net: hns3: fix interrupt clearing error for VF (bsc#1104353 ).
- net: hns3: fix mis-counting IRQ vector numbers issue (bsc#1104353).
- net: hns3: fix shaper parameter algorithm (bsc#1104353 ).
- net: hns3: fix the number of queues actually used by ARQ (bsc#1104353).
- net: hns3: fix use-after-free when doing self test (bsc#1104353 ).
- net: hns3: reallocate SSU' buffer size when pfc_en changes (bsc#1104353).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (bsc#1098633).
- net: mvpp2: Fix error return code in mvpp2_open() (bsc#1119113 ).
- net: mvpp2: fix pkt coalescing int-threshold configuration (bsc#1098633).
- net: phy: Allow BCM54616S PHY to setup internal TX/RX clock delay (git-fixes).
- net: phy: broadcom: Fix RGMII delays configuration for BCM54210E (git-fixes).
- net: phy: micrel: Discern KSZ8051 and KSZ8795 PHYs (git-fixes).
- net: phy: micrel: make sure the factory test bit is cleared (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: dwmac-meson8b: Fix signedness bug in probe (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: gmac4+: Not all Unicast addresses may be available (git-fixes).
- net: sunrpc: interpret the return value of kstrtou32 correctly (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- net: usb: lan78xx: Fix error message format specifier (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (git-fixes).
- net_failover: fixed rollback in net_failover_open() (bsc#1109837).
- net_sched: let qdisc_put() accept NULL pointer (bsc#1056657 bsc#1056653 bsc#1056787).
- nfp: validate the return code from dev_queue_xmit() (git-fixes).
- nfs_common: need lock during iterate through the list (git-fixes).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- page_frag: Recover from memory pressure (git fixes (mm/pgalloc)).
- powerpc/perf: Add generic compat mode pmu driver (bsc#1178900 ltc#189284).
- powerpc/perf: Fix crashes with generic_compat_pmu & BHRB (bsc#1178900 ltc#189284 git-fixes).
- powerpc/perf: init pmu from core-book3s (bsc#1178900 ltc#189284).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix use after free in qed_chain_free (bsc#1050536 bsc#1050538).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix list corruption of lcu list (bsc#1181170 LTC#190915).
- s390/dasd: fix list corruption of pavgroup group list (bsc#1181170 LTC#190915).
- s390/dasd: prevent inconsistent LCU device data (bsc#1181170 LTC#190915).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Fix enqueue_task_fair warning (bsc#1179093).
- sched/fair: Fix enqueue_task_fair() warning some more (bsc#1179093).
- sched/fair: Fix reordering of enqueue/dequeue_task_fair() (bsc#1179093).
- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (bsc#1179093).
- sched/fair: Reorder enqueue/dequeue_task_fair path (bsc#1179093).
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049, git-fixes).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- team: set dev->needed_headroom in team_setup_by_port() (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (bsc#1109837).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (bsc#1109837).
- vfio iommu: Add dma available capability (bsc#1179573 LTC#190106).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181231).
- vhost/vsock: fix vhost vsock cid hashing inconsistent (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181260, jsc#ECO-3191).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181260, jsc#ECO-3191).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/i8259: Use printk_deferred() to prevent deadlock (bsc#1112178).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181260, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181260, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181260, jsc#ECO-3191).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1112178).
- x86/mm: Fix leak of pmd ptlock (bsc#1112178).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181260, jsc#ECO-3191).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1112178).
- x86/resctrl: Do not move a task to the same resource group (bsc#1112178).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1112178).
- xdp: Fix xsk_generic_xmit errno (bsc#1109837).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
Patchnames
SUSE-2021-532,SUSE-SLE-Module-Live-Patching-15-SP1-2021-532,SUSE-SLE-Product-HA-15-SP1-2021-532,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-532,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-532,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-532,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-532,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-532,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-532,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-532,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-532,SUSE-SLE-Product-WE-15-SP1-2021-532,SUSE-Storage-6-2021-532
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": " The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).\n- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).\n- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)\n- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n\nThe following non-security bugs were fixed:\n\n- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).\n- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).\n- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).\n- ALSA: doc: Fix reference to mixart.rst (git-fixes).\n- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).\n- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).\n- ALSA: hda/via: Add minimum mute flag (git-fixes).\n- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).\n- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).\n- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).\n- ASoC: Intel: haswell: Add missing pm_ops (git-fixes).\n- ASoC: dapm: remove widget from dirty list on free (git-fixes).\n- EDAC/amd64: Fix PCI component registration (bsc#1112178).\n- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (bsc#1103991).\n- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180912).\n- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (bsc#1181230).\n- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (git-fixes).\n- NFS: nfs_igrab_and_active must first reference the superblock (git-fixes).\n- NFS: switch nfsiod to be an UNBOUND workqueue (git-fixes).\n- NFSv4.2: condition READDIR\u0027s mask for security label based on LSM state (git-fixes).\n- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1103992).\n- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1050244 ).\n- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1104742).\n- RDMA/cma: Do not overwrite sgid_attr after device is released (bsc#1103992).\n- RDMA/core: Ensure security pkey modify is not lost (bsc#1046306 ).\n- RDMA/core: Fix pkey and port assignment in get_new_pps (bsc#1046306).\n- RDMA/core: Fix protection fault in get_pkey_idx_qp_list (bsc#1046306).\n- RDMA/core: Fix reported speed and width (bsc#1046306 ).\n- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1103992).\n- RDMA/core: Fix use of logical OR in get_new_pps (bsc#1046306 ).\n- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1104427).\n- RDMA/hns: Bugfix for slab-out-of-bounds when unloading hip08 driver (bsc#1104427).\n- RDMA/hns: Fix cmdq parameter of querying pf timer resource (bsc#1104427 bsc#1126206).\n- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1104427 ).\n- RDMA/hns: bugfix for slab-out-of-bounds when loading hip08 driver (bsc#1104427).\n- RDMA/iw_cxgb4: Fix incorrect function parameters (bsc#1136348 jsc#SLE-4684).\n- RDMA/iw_cxgb4: initiate CLOSE when entering TERM (bsc#1136348 jsc#SLE-4684).\n- RDMA/mlx5: Add init2init as a modify command (bsc#1103991 ).\n- RDMA/mlx5: Fix typo in enum name (bsc#1103991).\n- RDMA/mlx5: Fix wrong free of blue flame register on error (bsc#1103991).\n- RDMA/qedr: Fix inline size returned for iWARP (bsc#1050545 ).\n- SUNRPC: cache: ignore timestamp written to \u0027flush\u0027 file (bsc#1178036).\n- USB: ehci: fix an interrupt calltrace error (git-fixes).\n- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).\n- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).\n- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).\n- USB: yurex: fix control-URB timeout handling (git-fixes).\n- __netif_receive_skb_core: pass skb by reference (bsc#1109837).\n- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).\n- arm64: pgtable: Fix pte_accessible() (bsc#1180130).\n- bnxt_en: Do not query FW when netif_running() is false (bsc#1086282).\n- bnxt_en: Fix accumulation of bp-\u003enet_stats_prev (bsc#1104745 ).\n- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (bsc#1104745).\n- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).\n- bnxt_en: Reset rings if ring reservation fails during open() (bsc#1086282).\n- bnxt_en: fix HWRM error when querying VF temperature (bsc#1104745).\n- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).\n- bnxt_en: fix error return code in bnxt_init_one() (bsc#1050242 ).\n- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).\n- bnxt_en: return proper error codes in bnxt_show_temp (bsc#1104745).\n- bonding: set dev-\u003eneeded_headroom in bond_setup_by_slave() (git-fixes).\n- btrfs: add a flag to iterate_inodes_from_logical to find all extent refs for uncompressed extents (bsc#1174206).\n- btrfs: add a flags argument to LOGICAL_INO and call it LOGICAL_INO_V2 (bsc#1174206).\n- btrfs: increase output size for LOGICAL_INO_V2 ioctl (bsc#1174206).\n- btrfs: qgroup: do not try to wait flushing if we\u0027re already holding a transaction (bsc#1179575).\n- caif: no need to check return value of debugfs_create functions (git-fixes).\n- can: c_can: c_can_power_up(): fix error handling (git-fixes).\n- can: dev: prevent potential information leak in can_fill_info() (git-fixes).\n- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).\n- chelsio/chtls: correct function return and return type (bsc#1104270).\n- chelsio/chtls: correct netdevice for vlan interface (bsc#1104270 ).\n- chelsio/chtls: fix a double free in chtls_setkey() (bsc#1104270 ).\n- chelsio/chtls: fix always leaking ctrl_skb (bsc#1104270 ).\n- chelsio/chtls: fix deadlock issue (bsc#1104270).\n- chelsio/chtls: fix memory leaks caused by a race (bsc#1104270 ).\n- chelsio/chtls: fix memory leaks in CPL handlers (bsc#1104270 ).\n- chelsio/chtls: fix panic during unload reload chtls (bsc#1104270 ).\n- chelsio/chtls: fix socket lock (bsc#1104270).\n- chelsio/chtls: fix tls record info to user (bsc#1104270 ).\n- chtls: Added a check to avoid NULL pointer dereference (bsc#1104270).\n- chtls: Fix chtls resources release sequence (bsc#1104270 ).\n- chtls: Fix hardware tid leak (bsc#1104270).\n- chtls: Remove invalid set_tcb call (bsc#1104270).\n- chtls: Replace skb_dequeue with skb_peek (bsc#1104270 ).\n- cpumap: Avoid warning when CONFIG_DEBUG_PER_CPU_MAPS is enabled (bsc#1109837).\n- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).\n- cxgb4/cxgb4vf: fix flow control display for auto negotiation (bsc#1046540 bsc#1046542).\n- cxgb4: fix SGE queue dump destination buffer context (bsc#1073513).\n- cxgb4: fix adapter crash due to wrong MC size (bsc#1073513).\n- cxgb4: fix all-mask IP address comparison (bsc#1064802 bsc#1066129).\n- cxgb4: fix large delays in PTP synchronization (bsc#1046540 bsc#1046648).\n- cxgb4: fix the panic caused by non smac rewrite (bsc#1064802 bsc#1066129).\n- cxgb4: fix thermal zone device registration (bsc#1104279 bsc#1104277).\n- cxgb4: fix throughput drop during Tx backpressure (bsc#1127354 bsc#1127371).\n- cxgb4: move DCB version extern to header file (bsc#1104279 ).\n- cxgb4: remove cast when saving IPv4 partial checksum (bsc#1074220).\n- cxgb4: set up filter action after rewrites (bsc#1064802 bsc#1066129).\n- cxgb4: use correct type for all-mask IP address comparison (bsc#1064802 bsc#1066129).\n- cxgb4: use unaligned conversion for fetching timestamp (bsc#1046540 bsc#1046648).\n- dm: avoid filesystem lookup in dm_get_dev_t() (bsc#1178049).\n- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).\n- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).\n- docs: Fix reST markup when linking to sections (git-fixes).\n- drivers: net: xgene: Fix the order of the arguments of \u0027alloc_etherdev_mqs()\u0027 (git-fixes).\n- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1113956)\n- drm/amdkfd: Put ACPI table after using it (bsc#1129770) Backporting changes: \t* context changes\n- drm/atomic: put state on error path (git-fixes).\n- drm/i915: Check for all subplatform bits (git-fixes).\n- drm/i915: Clear the repeater bit on HDCP disable (bsc#1112178)\n- drm/i915: Fix sha_text population code (bsc#1112178)\n- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1129770)\n- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1129770)\n- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1129770)\n- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).\n- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).\n- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).\n- drm/tve200: Fix handling of platform_get_irq() error (bsc#1129770)\n- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1112178)\n- drm: sun4i: hdmi: Fix inverted HPD result (bsc#1112178)\n- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1112178)\n- ehci: fix EHCI host controller initialization sequence (git-fixes).\n- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).\n- floppy: reintroduce O_NDELAY fix (boo#1181018).\n- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).\n- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).\n- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).\n- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).\n- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).\n- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).\n- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).\n- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).\n- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).\n- i40e: avoid premature Rx buffer reuse (bsc#1111981).\n- igb: Report speed and duplex as unknown when device is runtime suspended (git-fixes).\n- igc: fix link speed advertising (jsc#SLE-4799).\n- iio: ad5504: Fix setting power-down state (git-fixes).\n- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181260, jsc#ECO-3191).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181260, jsc#ECO-3191).\n- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (bsc#1109837).\n- ixgbe: avoid premature Rx buffer reuse (bsc#1109837 ).\n- kABI: Fix kABI for extended APIC-ID support (bsc#1181260, jsc#ECO-3191).\n- kernfs: deal with kernfs_fill_super() failures (bsc#1181809).\n- lockd: do not use interval-based rebinding over TCP (git-fixes).\n- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).\n- md/raid10: initialize r10_bio-\u003eread_slot before use (git-fixes).\n- md: fix a warning caused by a race between concurrent md_ioctl()s (git-fixes).\n- media: gp8psk: initialize stats at power control logic (git-fixes).\n- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).\n- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).\n- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).\n- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (bsc#1112374).\n- mlxsw: spectrum: Do not modify cloned SKBs during xmit (git-fixes).\n- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (bsc#1112374).\n- mlxsw: switchx2: Do not modify cloned SKBs during xmit (git-fixes).\n- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/hotplug)).\n- mm/page_alloc: fix watchdog soft lockups during set_zone_contiguous() (git fixes (mm/pgalloc)).\n- mm/rmap: map_pte() was not handling private ZONE_DEVICE page properly (git fixes (mm/hmm)).\n- mm/slab: use memzero_explicit() in kzfree() (git fixes (mm/slab)).\n- mm: do not wake kswapd prematurely when watermark boosting is disabled (git fixes (mm/vmscan)).\n- mm: hwpoison: disable memory error handling on 1GB hugepage (git fixes (mm/hwpoison)).\n- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).\n- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).\n- net/af_iucv: always register net_device notifier (git-fixes).\n- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179563 LTC#190108).\n- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).\n- net/filter: Permit reading NET in load_bytes_relative when MAC not set (bsc#1109837).\n- net/liquidio: Delete driver version assignment (git-fixes).\n- net/liquidio: Delete non-working LIQUIDIO_PACKAGE check (git-fixes).\n- net/mlx4_en: Avoid scheduling restart task if it is already running (git-fixes).\n- net/mlx5: Add handling of port type in rule deletion (bsc#1103991).\n- net/mlx5: Fix memory leak on flow table creation error flow (bsc#1046305).\n- net/mlx5e: Fix VLAN cleanup flow (git-fixes).\n- net/mlx5e: Fix VLAN create flow (git-fixes).\n- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).\n- net/mlx5e: Fix two double free cases (bsc#1046305).\n- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (bsc#1075020).\n- net/mlx5e: TX, Fix consumer index of error cqe dump (bsc#1103990 ).\n- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (bsc#1103990).\n- net/sched: act_tunnel_key: fix OOB write in case of IPv6 ERSPAN tunnels (bsc#1109837).\n- net/smc: cancel event worker during device removal (git-fixes).\n- net/smc: check for valid ib_client_data (git-fixes).\n- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).\n- net/smc: receive pending data after RCV_SHUTDOWN (git-fixes).\n- net/smc: receive returns without data (git-fixes).\n- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).\n- net: atlantic: fix potential error handling (git-fixes).\n- net: atlantic: fix use after free kasan warn (git-fixes).\n- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).\n- net: bcmgenet: reapply manual settings to the PHY (git-fixes).\n- net: broadcom/bcmsysport: Fix signedness in bcm_sysport_probe() (git-fixes).\n- net: cbs: Fix software cbs to consider packet sending time (bsc#1109837).\n- net: dsa: LAN9303: select REGMAP when LAN9303 enable (git-fixes).\n- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (git-fixes).\n- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).\n- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).\n- net: ethernet: stmmac: Fix signedness bug in ipq806x_gmac_of_parse() (git-fixes).\n- net: freescale: fec: Fix ethtool -d runtime PM (git-fixes).\n- net: hns3: add a missing uninit debugfs when unload driver (bsc#1104353).\n- net: hns3: add compatible handling for command HCLGE_OPC_PF_RST_DONE (git-fixes).\n- net: hns3: add management table after IMP reset (bsc#1104353 ).\n- net: hns3: check reset interrupt status when reset fails (git-fixes).\n- net: hns3: clear reset interrupt status in hclge_irq_handle() (git-fixes).\n- net: hns3: fix a TX timeout issue (bsc#1104353).\n- net: hns3: fix a wrong reset interrupt status mask (git-fixes).\n- net: hns3: fix error VF index when setting VLAN offload (bsc#1104353).\n- net: hns3: fix error handling for desc filling (bsc#1104353 ).\n- net: hns3: fix for not calculating TX BD send size correctly (bsc#1126390).\n- net: hns3: fix interrupt clearing error for VF (bsc#1104353 ).\n- net: hns3: fix mis-counting IRQ vector numbers issue (bsc#1104353).\n- net: hns3: fix shaper parameter algorithm (bsc#1104353 ).\n- net: hns3: fix the number of queues actually used by ARQ (bsc#1104353).\n- net: hns3: fix use-after-free when doing self test (bsc#1104353 ).\n- net: hns3: reallocate SSU\u0027 buffer size when pfc_en changes (bsc#1104353).\n- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (bsc#1098633).\n- net: mvpp2: Fix error return code in mvpp2_open() (bsc#1119113 ).\n- net: mvpp2: fix pkt coalescing int-threshold configuration (bsc#1098633).\n- net: phy: Allow BCM54616S PHY to setup internal TX/RX clock delay (git-fixes).\n- net: phy: broadcom: Fix RGMII delays configuration for BCM54210E (git-fixes).\n- net: phy: micrel: Discern KSZ8051 and KSZ8795 PHYs (git-fixes).\n- net: phy: micrel: make sure the factory test bit is cleared (git-fixes).\n- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).\n- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).\n- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).\n- net: stmmac: Do not accept invalid MTU values (git-fixes).\n- net: stmmac: Enable 16KB buffer size (git-fixes).\n- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).\n- net: stmmac: dwmac-meson8b: Fix signedness bug in probe (git-fixes).\n- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).\n- net: stmmac: fix length of PTP clock\u0027s name string (git-fixes).\n- net: stmmac: gmac4+: Not all Unicast addresses may be available (git-fixes).\n- net: sunrpc: interpret the return value of kstrtou32 correctly (git-fixes).\n- net: team: fix memory leak in __team_options_register (git-fixes).\n- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).\n- net: usb: lan78xx: Fix error message format specifier (git-fixes).\n- net: vlan: avoid leaks on register_vlan_dev() failures (git-fixes).\n- net_failover: fixed rollback in net_failover_open() (bsc#1109837).\n- net_sched: let qdisc_put() accept NULL pointer (bsc#1056657 bsc#1056653 bsc#1056787).\n- nfp: validate the return code from dev_queue_xmit() (git-fixes).\n- nfs_common: need lock during iterate through the list (git-fixes).\n- nfsd4: readdirplus shouldn\u0027t return parent of export (git-fixes).\n- nfsd: Fix message level for normal termination (git-fixes).\n- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).\n- page_frag: Recover from memory pressure (git fixes (mm/pgalloc)).\n- powerpc/perf: Add generic compat mode pmu driver (bsc#1178900 ltc#189284).\n- powerpc/perf: Fix crashes with generic_compat_pmu \u0026 BHRB (bsc#1178900 ltc#189284 git-fixes).\n- powerpc/perf: init pmu from core-book3s (bsc#1178900 ltc#189284).\n- qed: Fix race condition between scheduling and destroying the slowpath workqueue (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix use after free in qed_chain_free (bsc#1050536 bsc#1050538).\n- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).\n- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).\n- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).\n- s390/dasd: fix list corruption of lcu list (bsc#1181170 LTC#190915).\n- s390/dasd: fix list corruption of pavgroup group list (bsc#1181170 LTC#190915).\n- s390/dasd: prevent inconsistent LCU device data (bsc#1181170 LTC#190915).\n- s390/qeth: delay draining the TX buffers (git-fixes).\n- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).\n- s390/qeth: fix deadlock during recovery (git-fixes).\n- s390/qeth: fix locking for discipline setup / removal (git-fixes).\n- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).\n- sched/fair: Fix enqueue_task_fair warning (bsc#1179093).\n- sched/fair: Fix enqueue_task_fair() warning some more (bsc#1179093).\n- sched/fair: Fix reordering of enqueue/dequeue_task_fair() (bsc#1179093).\n- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (bsc#1179093).\n- sched/fair: Reorder enqueue/dequeue_task_fair path (bsc#1179093).\n- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049, git-fixes).\n- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).\n- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).\n- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).\n- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).\n- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).\n- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).\n- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).\n- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).\n- scsi: lpfc: Fix target reset failing (bsc#1180891).\n- scsi: lpfc: Fix vport create logging (bsc#1180891).\n- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).\n- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).\n- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).\n- scsi: lpfc: Simplify bool comparison (bsc#1180891).\n- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).\n- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).\n- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).\n- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).\n- spi: cadence: cache reference clock rate during probe (git-fixes).\n- team: set dev-\u003eneeded_headroom in team_setup_by_port() (git-fixes).\n- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (bsc#1109837).\n- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).\n- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).\n- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).\n- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).\n- usb: gadget: select CONFIG_CRC32 (git-fixes).\n- usb: udc: core: Use lock when write to soft_connect (git-fixes).\n- veth: Adjust hard_start offset on redirect XDP frames (bsc#1109837).\n- vfio iommu: Add dma available capability (bsc#1179573 LTC#190106).\n- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181231).\n- vhost/vsock: fix vhost vsock cid hashing inconsistent (git-fixes).\n- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).\n- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).\n- wil6210: select CONFIG_CRC32 (git-fixes).\n- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181260, jsc#ECO-3191).\n- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181260, jsc#ECO-3191).\n- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).\n- x86/i8259: Use printk_deferred() to prevent deadlock (bsc#1112178).\n- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181260, jsc#ECO-3191).\n- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181260, jsc#ECO-3191).\n- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181260, jsc#ECO-3191).\n- x86/mm/numa: Remove uninitialized_var() usage (bsc#1112178).\n- x86/mm: Fix leak of pmd ptlock (bsc#1112178).\n- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181260, jsc#ECO-3191).\n- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1112178).\n- x86/resctrl: Do not move a task to the same resource group (bsc#1112178).\n- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1112178).\n- xdp: Fix xsk_generic_xmit errno (bsc#1109837).\n- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).\n- xhci: tegra: Delay for disabling LFPS detector (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-532,SUSE-SLE-Module-Live-Patching-15-SP1-2021-532,SUSE-SLE-Product-HA-15-SP1-2021-532,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-532,SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-532,SUSE-SLE-Product-SLES-15-SP1-BCL-2021-532,SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-532,SUSE-SLE-Product-SLES_SAP-15-SP1-2021-532,SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-532,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-532,SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-532,SUSE-SLE-Product-WE-15-SP1-2021-532,SUSE-Storage-6-2021-532", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0532-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0532-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210532-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0532-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1046540", "url": "https://bugzilla.suse.com/1046540" }, { "category": "self", "summary": "SUSE Bug 1046542", "url": "https://bugzilla.suse.com/1046542" }, { "category": "self", "summary": "SUSE Bug 1046648", "url": "https://bugzilla.suse.com/1046648" }, { "category": "self", "summary": "SUSE Bug 1050242", "url": "https://bugzilla.suse.com/1050242" }, { "category": "self", "summary": "SUSE Bug 1050244", "url": "https://bugzilla.suse.com/1050244" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050538", "url": "https://bugzilla.suse.com/1050538" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1056653", "url": "https://bugzilla.suse.com/1056653" }, { "category": "self", "summary": "SUSE Bug 1056657", "url": "https://bugzilla.suse.com/1056657" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1074220", "url": "https://bugzilla.suse.com/1074220" }, { "category": "self", "summary": "SUSE Bug 1075020", "url": "https://bugzilla.suse.com/1075020" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1098633", "url": "https://bugzilla.suse.com/1098633" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104270", "url": "https://bugzilla.suse.com/1104270" }, { "category": "self", "summary": "SUSE Bug 1104277", "url": "https://bugzilla.suse.com/1104277" }, { "category": "self", "summary": "SUSE Bug 1104279", "url": "https://bugzilla.suse.com/1104279" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1104427", "url": "https://bugzilla.suse.com/1104427" }, { "category": "self", "summary": "SUSE Bug 1104742", "url": "https://bugzilla.suse.com/1104742" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111981", "url": "https://bugzilla.suse.com/1111981" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1119113", "url": "https://bugzilla.suse.com/1119113" }, { "category": "self", "summary": "SUSE Bug 1126206", "url": "https://bugzilla.suse.com/1126206" }, { "category": "self", "summary": "SUSE Bug 1126390", "url": "https://bugzilla.suse.com/1126390" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1136348", "url": "https://bugzilla.suse.com/1136348" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1174206", "url": "https://bugzilla.suse.com/1174206" }, { "category": "self", "summary": "SUSE Bug 1176831", "url": "https://bugzilla.suse.com/1176831" }, { "category": "self", "summary": "SUSE Bug 1176846", "url": "https://bugzilla.suse.com/1176846" }, { "category": "self", "summary": "SUSE Bug 1178036", "url": "https://bugzilla.suse.com/1178036" }, { "category": "self", "summary": "SUSE Bug 1178049", "url": "https://bugzilla.suse.com/1178049" }, { "category": "self", "summary": "SUSE Bug 1178900", "url": "https://bugzilla.suse.com/1178900" }, { "category": "self", "summary": "SUSE Bug 1179093", "url": "https://bugzilla.suse.com/1179093" }, { "category": "self", "summary": "SUSE Bug 1179142", "url": "https://bugzilla.suse.com/1179142" }, { "category": "self", "summary": "SUSE Bug 1179508", "url": "https://bugzilla.suse.com/1179508" }, { "category": "self", "summary": "SUSE Bug 1179509", "url": "https://bugzilla.suse.com/1179509" }, { "category": "self", "summary": "SUSE Bug 1179563", "url": "https://bugzilla.suse.com/1179563" }, { "category": "self", "summary": "SUSE Bug 1179573", "url": "https://bugzilla.suse.com/1179573" }, { "category": "self", "summary": "SUSE Bug 1179575", "url": "https://bugzilla.suse.com/1179575" }, { "category": "self", "summary": "SUSE Bug 1179878", "url": "https://bugzilla.suse.com/1179878" }, { "category": "self", "summary": "SUSE Bug 1180130", "url": "https://bugzilla.suse.com/1180130" }, { "category": "self", "summary": "SUSE Bug 1180765", "url": "https://bugzilla.suse.com/1180765" }, { "category": "self", "summary": "SUSE Bug 1180812", "url": "https://bugzilla.suse.com/1180812" }, { "category": "self", "summary": "SUSE Bug 1180891", "url": "https://bugzilla.suse.com/1180891" }, { "category": "self", "summary": "SUSE Bug 1180912", "url": "https://bugzilla.suse.com/1180912" }, { "category": "self", "summary": "SUSE Bug 1181018", "url": "https://bugzilla.suse.com/1181018" }, { "category": "self", "summary": "SUSE Bug 1181170", "url": "https://bugzilla.suse.com/1181170" }, { "category": "self", "summary": "SUSE Bug 1181230", "url": "https://bugzilla.suse.com/1181230" }, { "category": "self", "summary": "SUSE Bug 1181231", "url": "https://bugzilla.suse.com/1181231" }, { "category": "self", "summary": "SUSE Bug 1181260", "url": "https://bugzilla.suse.com/1181260" }, { "category": "self", "summary": "SUSE Bug 1181349", "url": "https://bugzilla.suse.com/1181349" }, { "category": "self", "summary": "SUSE Bug 1181425", "url": "https://bugzilla.suse.com/1181425" }, { "category": "self", "summary": "SUSE Bug 1181504", "url": "https://bugzilla.suse.com/1181504" }, { "category": "self", "summary": "SUSE Bug 1181809", "url": "https://bugzilla.suse.com/1181809" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27835 page", "url": "https://www.suse.com/security/cve/CVE-2020-27835/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29568 page", "url": "https://www.suse.com/security/cve/CVE-2020-29568/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29569 page", "url": "https://www.suse.com/security/cve/CVE-2020-29569/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-0342 page", "url": "https://www.suse.com/security/cve/CVE-2021-0342/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20177 page", "url": "https://www.suse.com/security/cve/CVE-2021-20177/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3347 page", "url": "https://www.suse.com/security/cve/CVE-2021-3347/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3348 page", "url": "https://www.suse.com/security/cve/CVE-2021-3348/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-02-19T16:29:23Z", "generator": { "date": "2021-02-19T16:29:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0532-1", "initial_release_date": "2021-02-19T16:29:23Z", "revision_history": [ { "date": "2021-02-19T16:29:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.83.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.83.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.83.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.83.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.83.1.aarch64", "product_id": "kernel-default-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.83.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.83.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.83.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.83.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.83.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.83.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.83.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.83.1.aarch64", "product_id": "kernel-syms-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.83.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.83.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.83.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.83.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.83.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.83.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.83.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.83.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.83.1.noarch", "product_id": "kernel-devel-4.12.14-197.83.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.83.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.83.1.noarch", "product_id": "kernel-docs-4.12.14-197.83.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.83.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.83.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.83.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.83.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.83.1.noarch", "product_id": "kernel-macros-4.12.14-197.83.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.83.1.noarch", "product": { "name": "kernel-source-4.12.14-197.83.1.noarch", "product_id": "kernel-source-4.12.14-197.83.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.83.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.83.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.83.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.83.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.83.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.83.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.83.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.83.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.83.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.83.1.ppc64le", "product_id": "kernel-default-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.83.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.83.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.83.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.83.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.83.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.83.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.83.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.83.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.83.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.83.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.83.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.83.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.83.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.83.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.83.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.83.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.83.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.83.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.83.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.83.1.s390x", "product": { "name": "kernel-default-4.12.14-197.83.1.s390x", "product_id": "kernel-default-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.83.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.83.1.s390x", "product_id": "kernel-default-base-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.83.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.83.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.83.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.83.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.83.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.83.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.83.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.83.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.83.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.83.1.s390x", "product_id": "kernel-default-man-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.83.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.83.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.83.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.83.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.83.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.83.1.s390x", "product_id": "kernel-syms-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.83.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.83.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.83.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.83.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.83.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.83.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.83.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.83.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.83.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.83.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.83.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.83.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.83.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.83.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.83.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.83.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.83.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.83.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.83.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.83.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.83.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.83.1.x86_64", "product_id": "kernel-debug-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.83.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.83.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.83.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.83.1.x86_64", "product_id": "kernel-default-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.83.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.83.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.83.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.83.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.83.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.83.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.83.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.83.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.83.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.83.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.83.1.x86_64", "product_id": "kernel-syms-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.83.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.83.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.83.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.83.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.83.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.83.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_bcl:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.0", "product": { "name": "SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.0" } } }, { "category": "product_name", "name": "SUSE Manager Retail Branch Server 4.0", "product": { "name": "SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.0" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.0", "product": { "name": "SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.0" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 6", "product": { "name": "SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", "product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.83.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.83.1.noarch as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.83.1.noarch as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.83.1.noarch as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.83.1.noarch as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Manager Proxy 4.0", "product_id": "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.83.1.noarch as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.83.1.noarch as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.83.1.noarch as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.83.1.noarch as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Manager Retail Branch Server 4.0", "product_id": "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Retail Branch Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.83.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.83.1.noarch as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.83.1.noarch as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.83.1.noarch as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.83.1.noarch as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.ppc64le as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.s390x as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Manager Server 4.0", "product_id": "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.83.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.83.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.83.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.83.1.noarch as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.83.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.aarch64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 6" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64 as component of SUSE Enterprise Storage 6", "product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-19T16:29:23Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-27835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27835" } ], "notes": [ { "category": "general", "text": "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27835", "url": "https://www.suse.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "SUSE Bug 1179878 for CVE-2020-27835", "url": "https://bugzilla.suse.com/1179878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-19T16:29:23Z", "details": "moderate" } ], "title": "CVE-2020-27835" }, { "cve": "CVE-2020-29568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29568" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29568", "url": "https://www.suse.com/security/cve/CVE-2020-29568" }, { "category": "external", "summary": "SUSE Bug 1179508 for CVE-2020-29568", "url": "https://bugzilla.suse.com/1179508" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-19T16:29:23Z", "details": "moderate" } ], "title": "CVE-2020-29568" }, { "cve": "CVE-2020-29569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29569" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29569", "url": "https://www.suse.com/security/cve/CVE-2020-29569" }, { "category": "external", "summary": "SUSE Bug 1179509 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1179509" }, { "category": "external", "summary": "SUSE Bug 1180008 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1180008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-19T16:29:23Z", "details": "important" } ], "title": "CVE-2020-29569" }, { "cve": "CVE-2021-0342", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-0342" } ], "notes": [ { "category": "general", "text": "In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-0342", "url": "https://www.suse.com/security/cve/CVE-2021-0342" }, { "category": "external", "summary": "SUSE Bug 1180812 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180812" }, { "category": "external", "summary": "SUSE Bug 1180859 for CVE-2021-0342", "url": "https://bugzilla.suse.com/1180859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-19T16:29:23Z", "details": "important" } ], "title": "CVE-2021-0342" }, { "cve": "CVE-2021-20177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20177" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20177", "url": "https://www.suse.com/security/cve/CVE-2021-20177" }, { "category": "external", "summary": "SUSE Bug 1180765 for CVE-2021-20177", "url": "https://bugzilla.suse.com/1180765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-19T16:29:23Z", "details": "moderate" } ], "title": "CVE-2021-20177" }, { "cve": "CVE-2021-3347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3347" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3347", "url": "https://www.suse.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "SUSE Bug 1181349 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181349" }, { "category": "external", "summary": "SUSE Bug 1181553 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181553" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-19T16:29:23Z", "details": "important" } ], "title": "CVE-2021-3347" }, { "cve": "CVE-2021-3348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3348" } ], "notes": [ { "category": "general", "text": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3348", "url": "https://www.suse.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "SUSE Bug 1181504 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181504" }, { "category": "external", "summary": "SUSE Bug 1181645 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:kernel-source-4.12.14-197.83.1.noarch", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_83-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-197.83.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Proxy 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Proxy 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Retail Branch Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Retail Branch Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-base-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-default-devel-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-default-man-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-devel-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-docs-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-macros-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-obs-build-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:kernel-source-4.12.14-197.83.1.noarch", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:kernel-syms-4.12.14-197.83.1.x86_64", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.ppc64le", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.s390x", "SUSE Manager Server 4.0:reiserfs-kmp-default-4.12.14-197.83.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-19T16:29:23Z", "details": "moderate" } ], "title": "CVE-2021-3348" } ] }
suse-su-2021:0434-1
Vulnerability from csaf_suse
Published
2021-02-11 08:49
Modified
2021-02-11 08:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket() that could be triggered by local attackers (with access to the nbd device) via an I/O request (bnc#1181504).
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
The following non-security bugs were fixed:
- blk-mq: improve heavily contended tag case (bsc#1178198).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (bsc#1163727).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- Move upstreamed bt fixes into sorted section
- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).
- net/x25: prevent a couple of overflows (bsc#1178590).
- NFS: mark nfsiod as CPU_INTENSIVE (bsc#1177304).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/dasd: fix hanging device offline processing (bsc#1144912).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- SUNRPC: cache: ignore timestamp written to 'flush' file (bsc#1178036).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
- xfrm: Fix memleak on xfrm state destroy (bsc#1158775).
Patchnames
SUSE-2021-434,SUSE-OpenStack-Cloud-9-2021-434,SUSE-OpenStack-Cloud-Crowbar-9-2021-434,SUSE-SLE-HA-12-SP4-2021-434,SUSE-SLE-Live-Patching-12-SP4-2021-434,SUSE-SLE-SAP-12-SP4-2021-434,SUSE-SLE-SERVER-12-SP4-LTSS-2021-434
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket() that could be triggered by local attackers (with access to the nbd device) via an I/O request (bnc#1181504).\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).\n- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).\n- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).\n- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).\n- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).\n- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).\n\nThe following non-security bugs were fixed:\n\n- blk-mq: improve heavily contended tag case (bsc#1178198).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- fix regression in \u0027epoll: Keep a reference on files added to the check list\u0027 (bsc#1180031, git-fixes).\n- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).\n- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).\n- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).\n- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).\n- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).\n- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).\n- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191).\n- kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).\n- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (bsc#1163727).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- Move upstreamed bt fixes into sorted section\n- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- NFS: mark nfsiod as CPU_INTENSIVE (bsc#1177304).\n- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).\n- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).\n- SUNRPC: cache: ignore timestamp written to \u0027flush\u0027 file (bsc#1178036).\n- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191).\n- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191).\n- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191).\n- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).\n- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).\n- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n- xfrm: Fix memleak on xfrm state destroy (bsc#1158775).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-434,SUSE-OpenStack-Cloud-9-2021-434,SUSE-OpenStack-Cloud-Crowbar-9-2021-434,SUSE-SLE-HA-12-SP4-2021-434,SUSE-SLE-Live-Patching-12-SP4-2021-434,SUSE-SLE-SAP-12-SP4-2021-434,SUSE-SLE-SERVER-12-SP4-LTSS-2021-434", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0434-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0434-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210434-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0434-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" }, { "category": "self", "summary": "SUSE Bug 1144912", "url": "https://bugzilla.suse.com/1144912" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1158775", "url": "https://bugzilla.suse.com/1158775" }, { "category": "self", "summary": "SUSE Bug 1163727", "url": "https://bugzilla.suse.com/1163727" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176846", "url": "https://bugzilla.suse.com/1176846" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1177304", "url": "https://bugzilla.suse.com/1177304" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1178036", "url": "https://bugzilla.suse.com/1178036" }, { "category": "self", "summary": "SUSE Bug 1178182", "url": "https://bugzilla.suse.com/1178182" }, { "category": "self", "summary": "SUSE Bug 1178198", "url": "https://bugzilla.suse.com/1178198" }, { "category": "self", "summary": "SUSE Bug 1178372", "url": "https://bugzilla.suse.com/1178372" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178590", "url": "https://bugzilla.suse.com/1178590" }, { "category": "self", "summary": "SUSE Bug 1178684", "url": "https://bugzilla.suse.com/1178684" }, { "category": "self", "summary": "SUSE Bug 1178886", "url": "https://bugzilla.suse.com/1178886" }, { "category": "self", "summary": "SUSE Bug 1179107", "url": "https://bugzilla.suse.com/1179107" }, { "category": "self", "summary": "SUSE Bug 1179140", "url": "https://bugzilla.suse.com/1179140" }, { "category": "self", "summary": "SUSE Bug 1179141", "url": "https://bugzilla.suse.com/1179141" }, { "category": "self", "summary": "SUSE Bug 1179419", "url": "https://bugzilla.suse.com/1179419" }, { "category": "self", "summary": "SUSE Bug 1179429", "url": "https://bugzilla.suse.com/1179429" }, { "category": "self", "summary": "SUSE Bug 1179508", "url": "https://bugzilla.suse.com/1179508" }, { "category": "self", "summary": "SUSE Bug 1179509", "url": "https://bugzilla.suse.com/1179509" }, { "category": "self", "summary": "SUSE Bug 1179601", "url": "https://bugzilla.suse.com/1179601" }, { "category": "self", "summary": "SUSE Bug 1179616", "url": "https://bugzilla.suse.com/1179616" }, { "category": "self", "summary": "SUSE Bug 1179663", "url": "https://bugzilla.suse.com/1179663" }, { "category": "self", "summary": "SUSE Bug 1179666", "url": "https://bugzilla.suse.com/1179666" }, { "category": "self", "summary": "SUSE Bug 1179745", "url": "https://bugzilla.suse.com/1179745" }, { "category": "self", "summary": "SUSE Bug 1179877", "url": "https://bugzilla.suse.com/1179877" }, { "category": "self", "summary": "SUSE Bug 1179878", "url": "https://bugzilla.suse.com/1179878" }, { "category": "self", "summary": "SUSE Bug 1179895", "url": "https://bugzilla.suse.com/1179895" }, { "category": "self", "summary": "SUSE Bug 1179960", "url": "https://bugzilla.suse.com/1179960" }, { "category": "self", "summary": "SUSE Bug 1179961", "url": "https://bugzilla.suse.com/1179961" }, { "category": "self", "summary": "SUSE Bug 1180008", "url": "https://bugzilla.suse.com/1180008" }, { "category": "self", "summary": "SUSE Bug 1180027", "url": "https://bugzilla.suse.com/1180027" }, { "category": "self", "summary": "SUSE Bug 1180028", "url": "https://bugzilla.suse.com/1180028" }, { "category": "self", "summary": "SUSE Bug 1180029", "url": "https://bugzilla.suse.com/1180029" }, { "category": "self", "summary": "SUSE Bug 1180030", "url": "https://bugzilla.suse.com/1180030" }, { "category": "self", "summary": "SUSE Bug 1180031", "url": "https://bugzilla.suse.com/1180031" }, { "category": "self", "summary": "SUSE Bug 1180032", "url": "https://bugzilla.suse.com/1180032" }, { "category": "self", "summary": "SUSE Bug 1180052", "url": "https://bugzilla.suse.com/1180052" }, { "category": "self", "summary": "SUSE Bug 1180086", "url": "https://bugzilla.suse.com/1180086" }, { "category": "self", "summary": "SUSE Bug 1180559", "url": "https://bugzilla.suse.com/1180559" }, { "category": "self", "summary": "SUSE Bug 1180562", "url": "https://bugzilla.suse.com/1180562" }, { "category": "self", "summary": "SUSE Bug 1180676", "url": "https://bugzilla.suse.com/1180676" }, { "category": "self", "summary": "SUSE Bug 1181001", "url": "https://bugzilla.suse.com/1181001" }, { "category": "self", "summary": "SUSE Bug 1181158", "url": "https://bugzilla.suse.com/1181158" }, { "category": "self", "summary": "SUSE Bug 1181349", "url": "https://bugzilla.suse.com/1181349" }, { "category": "self", "summary": "SUSE Bug 1181504", "url": "https://bugzilla.suse.com/1181504" }, { "category": "self", "summary": "SUSE Bug 1181553", "url": "https://bugzilla.suse.com/1181553" }, { "category": "self", "summary": "SUSE Bug 1181645", "url": "https://bugzilla.suse.com/1181645" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20934 page", "url": "https://www.suse.com/security/cve/CVE-2019-20934/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0444 page", "url": "https://www.suse.com/security/cve/CVE-2020-0444/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0465 page", "url": "https://www.suse.com/security/cve/CVE-2020-0465/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0466 page", "url": "https://www.suse.com/security/cve/CVE-2020-0466/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15436 page", "url": "https://www.suse.com/security/cve/CVE-2020-15436/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15437 page", "url": "https://www.suse.com/security/cve/CVE-2020-15437/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25211 page", "url": "https://www.suse.com/security/cve/CVE-2020-25211/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25669 page", "url": "https://www.suse.com/security/cve/CVE-2020-25669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27068 page", "url": "https://www.suse.com/security/cve/CVE-2020-27068/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27777 page", "url": "https://www.suse.com/security/cve/CVE-2020-27777/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27786 page", "url": "https://www.suse.com/security/cve/CVE-2020-27786/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27825 page", "url": "https://www.suse.com/security/cve/CVE-2020-27825/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27835 page", "url": "https://www.suse.com/security/cve/CVE-2020-27835/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28374 page", "url": "https://www.suse.com/security/cve/CVE-2020-28374/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28915 page", "url": "https://www.suse.com/security/cve/CVE-2020-28915/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28974 page", "url": "https://www.suse.com/security/cve/CVE-2020-28974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29371 page", "url": "https://www.suse.com/security/cve/CVE-2020-29371/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29568 page", "url": "https://www.suse.com/security/cve/CVE-2020-29568/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29569 page", "url": "https://www.suse.com/security/cve/CVE-2020-29569/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36158 page", "url": "https://www.suse.com/security/cve/CVE-2020-36158/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-4788 page", "url": "https://www.suse.com/security/cve/CVE-2020-4788/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3347 page", "url": "https://www.suse.com/security/cve/CVE-2021-3347/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3348 page", "url": "https://www.suse.com/security/cve/CVE-2021-3348/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-02-11T08:49:30Z", "generator": { "date": "2021-02-11T08:49:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0434-1", "initial_release_date": "2021-02-11T08:49:30Z", "revision_history": [ { "date": "2021-02-11T08:49:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.68.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.68.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.68.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.68.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.68.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.68.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.68.1.aarch64", "product_id": "kernel-default-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.68.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.68.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.68.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.68.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.68.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.68.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.68.1.aarch64", "product_id": "kernel-syms-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.68.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.68.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.68.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.68.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.68.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.68.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.68.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.68.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.68.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.68.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.68.1.noarch", "product_id": "kernel-devel-4.12.14-95.68.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.68.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.68.1.noarch", "product_id": "kernel-docs-4.12.14-95.68.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.68.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.68.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.68.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.68.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.68.1.noarch", "product_id": "kernel-macros-4.12.14-95.68.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.68.1.noarch", "product": { "name": "kernel-source-4.12.14-95.68.1.noarch", "product_id": "kernel-source-4.12.14-95.68.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.68.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.68.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.68.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.68.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.68.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.68.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.68.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.68.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.68.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.68.1.ppc64le", "product_id": "kernel-default-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.68.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.68.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.68.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.68.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.68.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.68.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.68.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.68.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.68.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.68.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.68.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.68.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.68.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.68.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.68.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.68.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.68.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.68.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.68.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.68.1.s390x", "product": { "name": "kernel-default-4.12.14-95.68.1.s390x", "product_id": "kernel-default-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.68.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.68.1.s390x", "product_id": "kernel-default-base-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.68.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.68.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.68.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.68.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.68.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.68.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.68.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.68.1.s390x", "product_id": "kernel-default-man-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.68.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.68.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.68.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.68.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.68.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.68.1.s390x", "product_id": "kernel-syms-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.68.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.68.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.68.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.68.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.68.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.68.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.68.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.68.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.68.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.68.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "product_id": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.68.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.68.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.68.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.68.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.68.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.68.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.68.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.68.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.68.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.68.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.68.1.x86_64", "product_id": "kernel-debug-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.68.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.68.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.68.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.68.1.x86_64", "product_id": "kernel-default-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.68.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.68.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.68.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.68.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.68.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.68.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.68.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.68.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.68.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.68.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.68.1.x86_64", "product_id": "kernel-syms-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.68.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.68.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.68.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.68.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.68.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.68.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.68.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.68.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.68.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.68.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.68.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.68.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.68.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.68.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.68.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.68.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-20934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20934" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20934", "url": "https://www.suse.com/security/cve/CVE-2019-20934" }, { "category": "external", "summary": "SUSE Bug 1179663 for CVE-2019-20934", "url": "https://bugzilla.suse.com/1179663" }, { "category": "external", "summary": "SUSE Bug 1179666 for CVE-2019-20934", "url": "https://bugzilla.suse.com/1179666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2019-20934" }, { "cve": "CVE-2020-0444", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0444" } ], "notes": [ { "category": "general", "text": "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0444", "url": "https://www.suse.com/security/cve/CVE-2020-0444" }, { "category": "external", "summary": "SUSE Bug 1180027 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180027" }, { "category": "external", "summary": "SUSE Bug 1180028 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180028" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-0444" }, { "cve": "CVE-2020-0465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0465" } ], "notes": [ { "category": "general", "text": "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0465", "url": "https://www.suse.com/security/cve/CVE-2020-0465" }, { "category": "external", "summary": "SUSE Bug 1180029 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180029" }, { "category": "external", "summary": "SUSE Bug 1180030 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2020-0465" }, { "cve": "CVE-2020-0466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0466" } ], "notes": [ { "category": "general", "text": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0466", "url": "https://www.suse.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "SUSE Bug 1180031 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180031" }, { "category": "external", "summary": "SUSE Bug 1180032 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180032" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2020-0466" }, { "cve": "CVE-2020-15436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15436" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15436", "url": "https://www.suse.com/security/cve/CVE-2020-15436" }, { "category": "external", "summary": "SUSE Bug 1179141 for CVE-2020-15436", "url": "https://bugzilla.suse.com/1179141" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-15437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15437" } ], "notes": [ { "category": "general", "text": "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-\u003eserial_in pointer which uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15437", "url": "https://www.suse.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "SUSE Bug 1179140 for CVE-2020-15437", "url": "https://bugzilla.suse.com/1179140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-15437" }, { "cve": "CVE-2020-25211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25211" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25211", "url": "https://www.suse.com/security/cve/CVE-2020-25211" }, { "category": "external", "summary": "SUSE Bug 1176395 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1176395" }, { "category": "external", "summary": "SUSE Bug 1192356 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1192356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-25211" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25669" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25669", "url": "https://www.suse.com/security/cve/CVE-2020-25669" }, { "category": "external", "summary": "SUSE Bug 1178182 for CVE-2020-25669", "url": "https://bugzilla.suse.com/1178182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-25669" }, { "cve": "CVE-2020-27068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27068" } ], "notes": [ { "category": "general", "text": "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27068", "url": "https://www.suse.com/security/cve/CVE-2020-27068" }, { "category": "external", "summary": "SUSE Bug 1180086 for CVE-2020-27068", "url": "https://bugzilla.suse.com/1180086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-27068" }, { "cve": "CVE-2020-27777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27777" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27777", "url": "https://www.suse.com/security/cve/CVE-2020-27777" }, { "category": "external", "summary": "SUSE Bug 1179107 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179107" }, { "category": "external", "summary": "SUSE Bug 1179419 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179419" }, { "category": "external", "summary": "SUSE Bug 1200343 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1200343" }, { "category": "external", "summary": "SUSE Bug 1220060 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1220060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-27777" }, { "cve": "CVE-2020-27786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27786" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27786", "url": "https://www.suse.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "SUSE Bug 1179601 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179601" }, { "category": "external", "summary": "SUSE Bug 1179616 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179616" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2020-27786" }, { "cve": "CVE-2020-27825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27825" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27825", "url": "https://www.suse.com/security/cve/CVE-2020-27825" }, { "category": "external", "summary": "SUSE Bug 1179960 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179960" }, { "category": "external", "summary": "SUSE Bug 1179961 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179961" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2020-27825" }, { "cve": "CVE-2020-27835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27835" } ], "notes": [ { "category": "general", "text": "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27835", "url": "https://www.suse.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "SUSE Bug 1179878 for CVE-2020-27835", "url": "https://bugzilla.suse.com/1179878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-27835" }, { "cve": "CVE-2020-28374", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28374" } ], "notes": [ { "category": "general", "text": "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28374", "url": "https://www.suse.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "SUSE Bug 1178372 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1178372" }, { "category": "external", "summary": "SUSE Bug 1178684 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1178684" }, { "category": "external", "summary": "SUSE Bug 1180676 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1180676" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2020-28374" }, { "cve": "CVE-2020-28915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28915" } ], "notes": [ { "category": "general", "text": "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28915", "url": "https://www.suse.com/security/cve/CVE-2020-28915" }, { "category": "external", "summary": "SUSE Bug 1178886 for CVE-2020-28915", "url": "https://bugzilla.suse.com/1178886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-28915" }, { "cve": "CVE-2020-28974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28974" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28974", "url": "https://www.suse.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "SUSE Bug 1178589 for CVE-2020-28974", "url": "https://bugzilla.suse.com/1178589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-28974" }, { "cve": "CVE-2020-29371", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29371" } ], "notes": [ { "category": "general", "text": "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29371", "url": "https://www.suse.com/security/cve/CVE-2020-29371" }, { "category": "external", "summary": "SUSE Bug 1179429 for CVE-2020-29371", "url": "https://bugzilla.suse.com/1179429" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-29371" }, { "cve": "CVE-2020-29568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29568" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29568", "url": "https://www.suse.com/security/cve/CVE-2020-29568" }, { "category": "external", "summary": "SUSE Bug 1179508 for CVE-2020-29568", "url": "https://bugzilla.suse.com/1179508" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-29568" }, { "cve": "CVE-2020-29569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29569" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29569", "url": "https://www.suse.com/security/cve/CVE-2020-29569" }, { "category": "external", "summary": "SUSE Bug 1179509 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1179509" }, { "category": "external", "summary": "SUSE Bug 1180008 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1180008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2020-29569" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-36158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36158" } ], "notes": [ { "category": "general", "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36158", "url": "https://www.suse.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "SUSE Bug 1180559 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180559" }, { "category": "external", "summary": "SUSE Bug 1180562 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2020-36158" }, { "cve": "CVE-2020-4788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-4788" } ], "notes": [ { "category": "general", "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-4788", "url": "https://www.suse.com/security/cve/CVE-2020-4788" }, { "category": "external", "summary": "SUSE Bug 1177666 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1177666" }, { "category": "external", "summary": "SUSE Bug 1181158 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1181158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2020-4788" }, { "cve": "CVE-2021-3347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3347" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3347", "url": "https://www.suse.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "SUSE Bug 1181349 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181349" }, { "category": "external", "summary": "SUSE Bug 1181553 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181553" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "important" } ], "title": "CVE-2021-3347" }, { "cve": "CVE-2021-3348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3348" } ], "notes": [ { "category": "general", "text": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3348", "url": "https://www.suse.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "SUSE Bug 1181504 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181504" }, { "category": "external", "summary": "SUSE Bug 1181645 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T08:49:30Z", "details": "moderate" } ], "title": "CVE-2021-3348" } ] }
suse-su-2021:0438-1
Vulnerability from csaf_suse
Published
2021-02-11 15:34
Modified
2021-02-11 15:34
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-10781: A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable (bnc#1173074).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-29371: An issue was discovered in romfs_dev_read in fs/romfs/storage.c where uninitialized memory leaks to userspace (bnc#1179429).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2019-20806: Fixed a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service (bnc#1172199).
The following non-security bugs were fixed:
- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840 bsc#1179071).
- blk-mq: make sure that line break can be printed (bsc#1163840 bsc#1179071).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).
- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).
- net/x25: prevent a couple of overflows (bsc#1178590).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/dasd: fix hanging device offline processing (bsc#1144912).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
Patchnames
SUSE-2021-438,SUSE-SLE-Module-Live-Patching-15-2021-438,SUSE-SLE-Product-HA-15-2021-438,SUSE-SLE-Product-HPC-15-2021-438,SUSE-SLE-Product-SLES-15-2021-438,SUSE-SLE-Product-SLES_SAP-15-2021-438
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).\n- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).\n- CVE-2020-10781: A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable (bnc#1173074).\n- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).\n- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).\n- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).\n- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).\n- CVE-2020-29371: An issue was discovered in romfs_dev_read in fs/romfs/storage.c where uninitialized memory leaks to userspace (bnc#1179429).\n- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).\n- CVE-2019-20806: Fixed a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service (bnc#1172199).\n\nThe following non-security bugs were fixed:\n\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840 bsc#1179071).\n- blk-mq: make sure that line break can be printed (bsc#1163840 bsc#1179071).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- fix regression in \u0027epoll: Keep a reference on files added to the check list\u0027 (bsc#1180031, git-fixes).\n- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).\n- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).\n- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).\n- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).\n- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).\n- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).\n- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191).\n- kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).\n- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).\n- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).\n- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191).\n- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191).\n- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191).\n- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).\n- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).\n- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-438,SUSE-SLE-Module-Live-Patching-15-2021-438,SUSE-SLE-Product-HA-15-2021-438,SUSE-SLE-Product-HPC-15-2021-438,SUSE-SLE-Product-SLES-15-2021-438,SUSE-SLE-Product-SLES_SAP-15-2021-438", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0438-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0438-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210438-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0438-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" }, { "category": "self", "summary": "SUSE Bug 1144912", "url": "https://bugzilla.suse.com/1144912" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1163840", "url": "https://bugzilla.suse.com/1163840" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173942", "url": "https://bugzilla.suse.com/1173942" }, { "category": "self", "summary": "SUSE Bug 1176395", "url": "https://bugzilla.suse.com/1176395" }, { "category": "self", "summary": "SUSE Bug 1176846", "url": "https://bugzilla.suse.com/1176846" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1178182", "url": "https://bugzilla.suse.com/1178182" }, { "category": "self", "summary": "SUSE Bug 1178272", "url": "https://bugzilla.suse.com/1178272" }, { "category": "self", "summary": "SUSE Bug 1178372", "url": "https://bugzilla.suse.com/1178372" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178590", "url": "https://bugzilla.suse.com/1178590" }, { "category": "self", "summary": "SUSE Bug 1178684", "url": "https://bugzilla.suse.com/1178684" }, { "category": "self", "summary": "SUSE Bug 1178886", "url": "https://bugzilla.suse.com/1178886" }, { "category": "self", "summary": "SUSE Bug 1179071", "url": "https://bugzilla.suse.com/1179071" }, { "category": "self", "summary": "SUSE Bug 1179107", "url": "https://bugzilla.suse.com/1179107" }, { "category": "self", "summary": "SUSE Bug 1179140", "url": "https://bugzilla.suse.com/1179140" }, { "category": "self", "summary": "SUSE Bug 1179141", "url": "https://bugzilla.suse.com/1179141" }, { "category": "self", "summary": "SUSE Bug 1179419", "url": "https://bugzilla.suse.com/1179419" }, { "category": "self", "summary": "SUSE Bug 1179429", "url": "https://bugzilla.suse.com/1179429" }, { "category": "self", "summary": "SUSE Bug 1179508", "url": "https://bugzilla.suse.com/1179508" }, { "category": "self", "summary": "SUSE Bug 1179509", "url": "https://bugzilla.suse.com/1179509" }, { "category": "self", "summary": "SUSE Bug 1179601", "url": "https://bugzilla.suse.com/1179601" }, { "category": "self", "summary": "SUSE Bug 1179616", "url": "https://bugzilla.suse.com/1179616" }, { "category": "self", "summary": "SUSE Bug 1179663", "url": "https://bugzilla.suse.com/1179663" }, { "category": "self", "summary": "SUSE Bug 1179666", "url": "https://bugzilla.suse.com/1179666" }, { "category": "self", "summary": "SUSE Bug 1179745", "url": "https://bugzilla.suse.com/1179745" }, { "category": "self", "summary": "SUSE Bug 1179877", "url": "https://bugzilla.suse.com/1179877" }, { "category": "self", "summary": "SUSE Bug 1179878", "url": "https://bugzilla.suse.com/1179878" }, { "category": "self", "summary": "SUSE Bug 1179895", "url": "https://bugzilla.suse.com/1179895" }, { "category": "self", "summary": "SUSE Bug 1179960", "url": "https://bugzilla.suse.com/1179960" }, { "category": "self", "summary": "SUSE Bug 1179961", "url": "https://bugzilla.suse.com/1179961" }, { "category": "self", "summary": "SUSE Bug 1180008", "url": "https://bugzilla.suse.com/1180008" }, { "category": "self", "summary": "SUSE Bug 1180027", "url": "https://bugzilla.suse.com/1180027" }, { "category": "self", "summary": "SUSE Bug 1180028", "url": "https://bugzilla.suse.com/1180028" }, { "category": "self", "summary": "SUSE Bug 1180029", "url": "https://bugzilla.suse.com/1180029" }, { "category": "self", "summary": "SUSE Bug 1180030", "url": "https://bugzilla.suse.com/1180030" }, { "category": "self", "summary": "SUSE Bug 1180031", "url": "https://bugzilla.suse.com/1180031" }, { "category": "self", "summary": "SUSE Bug 1180032", "url": "https://bugzilla.suse.com/1180032" }, { "category": "self", "summary": "SUSE Bug 1180052", "url": "https://bugzilla.suse.com/1180052" }, { "category": "self", "summary": "SUSE Bug 1180086", "url": "https://bugzilla.suse.com/1180086" }, { "category": "self", "summary": "SUSE Bug 1180559", "url": "https://bugzilla.suse.com/1180559" }, { "category": "self", "summary": "SUSE Bug 1180562", "url": "https://bugzilla.suse.com/1180562" }, { "category": "self", "summary": "SUSE Bug 1180676", "url": "https://bugzilla.suse.com/1180676" }, { "category": "self", "summary": "SUSE Bug 1181001", "url": "https://bugzilla.suse.com/1181001" }, { "category": "self", "summary": "SUSE Bug 1181158", "url": "https://bugzilla.suse.com/1181158" }, { "category": "self", "summary": "SUSE Bug 1181349", "url": "https://bugzilla.suse.com/1181349" }, { "category": "self", "summary": "SUSE Bug 1181504", "url": "https://bugzilla.suse.com/1181504" }, { "category": "self", "summary": "SUSE Bug 1181553", "url": "https://bugzilla.suse.com/1181553" }, { "category": "self", "summary": "SUSE Bug 1181645", "url": "https://bugzilla.suse.com/1181645" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20934 page", "url": "https://www.suse.com/security/cve/CVE-2019-20934/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0444 page", "url": "https://www.suse.com/security/cve/CVE-2020-0444/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0465 page", "url": "https://www.suse.com/security/cve/CVE-2020-0465/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0466 page", "url": "https://www.suse.com/security/cve/CVE-2020-0466/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15436 page", "url": "https://www.suse.com/security/cve/CVE-2020-15436/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15437 page", "url": "https://www.suse.com/security/cve/CVE-2020-15437/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25211 page", "url": "https://www.suse.com/security/cve/CVE-2020-25211/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25669 page", "url": "https://www.suse.com/security/cve/CVE-2020-25669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27068 page", "url": "https://www.suse.com/security/cve/CVE-2020-27068/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27777 page", "url": "https://www.suse.com/security/cve/CVE-2020-27777/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27786 page", "url": "https://www.suse.com/security/cve/CVE-2020-27786/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27825 page", "url": "https://www.suse.com/security/cve/CVE-2020-27825/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27835 page", "url": "https://www.suse.com/security/cve/CVE-2020-27835/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28374 page", "url": "https://www.suse.com/security/cve/CVE-2020-28374/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28915 page", "url": "https://www.suse.com/security/cve/CVE-2020-28915/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28974 page", "url": "https://www.suse.com/security/cve/CVE-2020-28974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29371 page", "url": "https://www.suse.com/security/cve/CVE-2020-29371/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29568 page", "url": "https://www.suse.com/security/cve/CVE-2020-29568/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29569 page", "url": "https://www.suse.com/security/cve/CVE-2020-29569/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36158 page", "url": "https://www.suse.com/security/cve/CVE-2020-36158/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-4788 page", "url": "https://www.suse.com/security/cve/CVE-2020-4788/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3347 page", "url": "https://www.suse.com/security/cve/CVE-2021-3347/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3348 page", "url": "https://www.suse.com/security/cve/CVE-2021-3348/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2021-02-11T15:34:15Z", "generator": { "date": "2021-02-11T15:34:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0438-1", "initial_release_date": "2021-02-11T15:34:15Z", "revision_history": [ { "date": "2021-02-11T15:34:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.66.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.66.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.66.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.66.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.66.1.aarch64", "product_id": "kernel-default-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.66.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.66.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.66.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.66.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.66.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.66.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.66.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.66.1.aarch64", "product_id": "kernel-syms-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.66.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.66.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.66.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.66.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.66.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.66.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.66.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.66.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.66.1.noarch", "product_id": "kernel-devel-4.12.14-150.66.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.66.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.66.1.noarch", "product_id": "kernel-docs-4.12.14-150.66.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.66.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.66.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.66.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.66.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.66.1.noarch", "product_id": "kernel-macros-4.12.14-150.66.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.66.1.noarch", "product": { "name": "kernel-source-4.12.14-150.66.1.noarch", "product_id": "kernel-source-4.12.14-150.66.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.66.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.66.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.66.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.66.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.66.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.66.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.66.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.66.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.66.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.66.1.ppc64le", "product_id": "kernel-default-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.66.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.66.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.66.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.66.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.66.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.66.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.66.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.66.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.66.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.66.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.66.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.66.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.66.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.66.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.66.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.66.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.66.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.66.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.66.1.s390x", "product": { "name": "kernel-default-4.12.14-150.66.1.s390x", "product_id": "kernel-default-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.66.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.66.1.s390x", "product_id": "kernel-default-base-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.66.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.66.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.66.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.66.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.66.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.66.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.66.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.66.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.66.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.66.1.s390x", "product_id": "kernel-default-man-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.66.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.66.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.66.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.66.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.66.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.66.1.s390x", "product_id": "kernel-syms-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.66.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.66.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.66.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.66.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.66.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.66.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.66.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.66.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.66.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.66.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.66.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.66.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.66.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.66.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.66.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.66.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.66.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.66.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.66.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.66.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.66.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.66.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.66.1.x86_64", "product_id": "kernel-debug-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.66.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.66.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.66.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.66.1.x86_64", "product_id": "kernel-default-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.66.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.66.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.66.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.66.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.66.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.66.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.66.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.66.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.66.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.66.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.66.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.66.1.x86_64", "product_id": "kernel-syms-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.66.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.66.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.66.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.66.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.66.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.66.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.66.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20934" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20934", "url": "https://www.suse.com/security/cve/CVE-2019-20934" }, { "category": "external", "summary": "SUSE Bug 1179663 for CVE-2019-20934", "url": "https://bugzilla.suse.com/1179663" }, { "category": "external", "summary": "SUSE Bug 1179666 for CVE-2019-20934", "url": "https://bugzilla.suse.com/1179666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2019-20934" }, { "cve": "CVE-2020-0444", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0444" } ], "notes": [ { "category": "general", "text": "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0444", "url": "https://www.suse.com/security/cve/CVE-2020-0444" }, { "category": "external", "summary": "SUSE Bug 1180027 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180027" }, { "category": "external", "summary": "SUSE Bug 1180028 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180028" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-0444" }, { "cve": "CVE-2020-0465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0465" } ], "notes": [ { "category": "general", "text": "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0465", "url": "https://www.suse.com/security/cve/CVE-2020-0465" }, { "category": "external", "summary": "SUSE Bug 1180029 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180029" }, { "category": "external", "summary": "SUSE Bug 1180030 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2020-0465" }, { "cve": "CVE-2020-0466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0466" } ], "notes": [ { "category": "general", "text": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0466", "url": "https://www.suse.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "SUSE Bug 1180031 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180031" }, { "category": "external", "summary": "SUSE Bug 1180032 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180032" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2020-0466" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-15436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15436" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15436", "url": "https://www.suse.com/security/cve/CVE-2020-15436" }, { "category": "external", "summary": "SUSE Bug 1179141 for CVE-2020-15436", "url": "https://bugzilla.suse.com/1179141" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-15437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15437" } ], "notes": [ { "category": "general", "text": "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-\u003eserial_in pointer which uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15437", "url": "https://www.suse.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "SUSE Bug 1179140 for CVE-2020-15437", "url": "https://bugzilla.suse.com/1179140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-15437" }, { "cve": "CVE-2020-25211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25211" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25211", "url": "https://www.suse.com/security/cve/CVE-2020-25211" }, { "category": "external", "summary": "SUSE Bug 1176395 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1176395" }, { "category": "external", "summary": "SUSE Bug 1192356 for CVE-2020-25211", "url": "https://bugzilla.suse.com/1192356" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-25211" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25669" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25669", "url": "https://www.suse.com/security/cve/CVE-2020-25669" }, { "category": "external", "summary": "SUSE Bug 1178182 for CVE-2020-25669", "url": "https://bugzilla.suse.com/1178182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-25669" }, { "cve": "CVE-2020-27068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27068" } ], "notes": [ { "category": "general", "text": "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27068", "url": "https://www.suse.com/security/cve/CVE-2020-27068" }, { "category": "external", "summary": "SUSE Bug 1180086 for CVE-2020-27068", "url": "https://bugzilla.suse.com/1180086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-27068" }, { "cve": "CVE-2020-27777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27777" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27777", "url": "https://www.suse.com/security/cve/CVE-2020-27777" }, { "category": "external", "summary": "SUSE Bug 1179107 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179107" }, { "category": "external", "summary": "SUSE Bug 1179419 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179419" }, { "category": "external", "summary": "SUSE Bug 1200343 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1200343" }, { "category": "external", "summary": "SUSE Bug 1220060 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1220060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-27777" }, { "cve": "CVE-2020-27786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27786" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27786", "url": "https://www.suse.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "SUSE Bug 1179601 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179601" }, { "category": "external", "summary": "SUSE Bug 1179616 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179616" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2020-27786" }, { "cve": "CVE-2020-27825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27825" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27825", "url": "https://www.suse.com/security/cve/CVE-2020-27825" }, { "category": "external", "summary": "SUSE Bug 1179960 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179960" }, { "category": "external", "summary": "SUSE Bug 1179961 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179961" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2020-27825" }, { "cve": "CVE-2020-27835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27835" } ], "notes": [ { "category": "general", "text": "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27835", "url": "https://www.suse.com/security/cve/CVE-2020-27835" }, { "category": "external", "summary": "SUSE Bug 1179878 for CVE-2020-27835", "url": "https://bugzilla.suse.com/1179878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-27835" }, { "cve": "CVE-2020-28374", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28374" } ], "notes": [ { "category": "general", "text": "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28374", "url": "https://www.suse.com/security/cve/CVE-2020-28374" }, { "category": "external", "summary": "SUSE Bug 1178372 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1178372" }, { "category": "external", "summary": "SUSE Bug 1178684 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1178684" }, { "category": "external", "summary": "SUSE Bug 1180676 for CVE-2020-28374", "url": "https://bugzilla.suse.com/1180676" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2020-28374" }, { "cve": "CVE-2020-28915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28915" } ], "notes": [ { "category": "general", "text": "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28915", "url": "https://www.suse.com/security/cve/CVE-2020-28915" }, { "category": "external", "summary": "SUSE Bug 1178886 for CVE-2020-28915", "url": "https://bugzilla.suse.com/1178886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-28915" }, { "cve": "CVE-2020-28974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28974" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28974", "url": "https://www.suse.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "SUSE Bug 1178589 for CVE-2020-28974", "url": "https://bugzilla.suse.com/1178589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-28974" }, { "cve": "CVE-2020-29371", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29371" } ], "notes": [ { "category": "general", "text": "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29371", "url": "https://www.suse.com/security/cve/CVE-2020-29371" }, { "category": "external", "summary": "SUSE Bug 1179429 for CVE-2020-29371", "url": "https://bugzilla.suse.com/1179429" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-29371" }, { "cve": "CVE-2020-29568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29568" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29568", "url": "https://www.suse.com/security/cve/CVE-2020-29568" }, { "category": "external", "summary": "SUSE Bug 1179508 for CVE-2020-29568", "url": "https://bugzilla.suse.com/1179508" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-29568" }, { "cve": "CVE-2020-29569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29569" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-\u003exenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29569", "url": "https://www.suse.com/security/cve/CVE-2020-29569" }, { "category": "external", "summary": "SUSE Bug 1179509 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1179509" }, { "category": "external", "summary": "SUSE Bug 1180008 for CVE-2020-29569", "url": "https://bugzilla.suse.com/1180008" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2020-29569" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-36158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36158" } ], "notes": [ { "category": "general", "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36158", "url": "https://www.suse.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "SUSE Bug 1180559 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180559" }, { "category": "external", "summary": "SUSE Bug 1180562 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2020-36158" }, { "cve": "CVE-2020-4788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-4788" } ], "notes": [ { "category": "general", "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-4788", "url": "https://www.suse.com/security/cve/CVE-2020-4788" }, { "category": "external", "summary": "SUSE Bug 1177666 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1177666" }, { "category": "external", "summary": "SUSE Bug 1181158 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1181158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2020-4788" }, { "cve": "CVE-2021-3347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3347" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3347", "url": "https://www.suse.com/security/cve/CVE-2021-3347" }, { "category": "external", "summary": "SUSE Bug 1181349 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181349" }, { "category": "external", "summary": "SUSE Bug 1181553 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1181553" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-3347", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "important" } ], "title": "CVE-2021-3347" }, { "cve": "CVE-2021-3348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3348" } ], "notes": [ { "category": "general", "text": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3348", "url": "https://www.suse.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "SUSE Bug 1181504 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181504" }, { "category": "external", "summary": "SUSE Bug 1181645 for CVE-2021-3348", "url": "https://bugzilla.suse.com/1181645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-11T15:34:15Z", "details": "moderate" } ], "title": "CVE-2021-3348" } ] }
rhsa-2021:4140
Vulnerability from csaf_redhat
Published
2021-11-09 17:26
Modified
2025-07-25 18:27
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)
* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)
* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)
* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)
* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)
* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)
* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)
* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)
* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)
* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)
* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)
* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)
* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)
* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)
* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)
* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)
* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)
* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)
* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)
* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)
* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)
* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)
* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)
* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)
* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)
* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)
* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)
* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)
* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)
* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)
* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)
* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)
* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)
* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)
* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)
* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)
* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)
* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)
* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)
* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)
* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4140", "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1875275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875275" }, { "category": "external", "summary": "1902412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902412" }, { "category": "external", "summary": "1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "1905747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905747" }, { "category": "external", "summary": "1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4140.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-07-25T18:27:43+00:00", "generator": { "date": "2025-07-25T18:27:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.4" } }, "id": "RHSA-2021:4140", "initial_release_date": "2021-11-09T17:26:23+00:00", "revision_history": [ { "date": "2021-11-09T17:26:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T17:26:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-25T18:27:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "product": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.rt7.130.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14615", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-01-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789209" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Intel graphics card information leak.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "RHBZ#1789209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Intel graphics card information leak." }, { "cve": "CVE-2020-0427", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919893" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads in pinctrl subsystem.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "RHBZ#1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427" } ], "release_date": "2020-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads in pinctrl subsystem." }, { "cve": "CVE-2020-24502", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930379" } ], "notes": [ { "category": "description", "text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24502" }, { "category": "external", "summary": "RHBZ#1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24503", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930381" } ], "notes": [ { "category": "description", "text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24503" }, { "category": "external", "summary": "RHBZ#1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24504", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930376" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24504" }, { "category": "external", "summary": "RHBZ#1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24586", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959642" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Fragmentation cache not cleared on reconnection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "RHBZ#1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-12T01:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Fragmentation cache not cleared on reconnection" }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959654" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Reassembling fragments encrypted under different keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "RHBZ#1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24587" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-11T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Reassembling fragments encrypted under different keys" }, { "cve": "CVE-2020-24588", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959657" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "RHBZ#1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24588" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame" }, { "cve": "CVE-2020-26139", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959663" } ], "notes": [ { "category": "description", "text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Forwarding EAPOL from unauthenticated wifi client", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "RHBZ#1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26139" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Forwarding EAPOL from unauthenticated wifi client" }, { "cve": "CVE-2020-26140", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960490" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext data frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26140" }, { "category": "external", "summary": "RHBZ#1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26140" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext data frames in protected networks" }, { "cve": "CVE-2020-26141", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960492" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: not verifying TKIP MIC of fragmented frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "RHBZ#1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: not verifying TKIP MIC of fragmented frames" }, { "cve": "CVE-2020-26143", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960496" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting fragmented plaintext frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26143" }, { "category": "external", "summary": "RHBZ#1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting fragmented plaintext frames in protected networks" }, { "cve": "CVE-2020-26144", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960498" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26144" }, { "category": "external", "summary": "RHBZ#1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header" }, { "cve": "CVE-2020-26145", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960500" } ], "notes": [ { "category": "description", "text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext broadcast fragments as full frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "RHBZ#1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26145" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext broadcast fragments as full frames" }, { "cve": "CVE-2020-26146", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960502" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26146" }, { "category": "external", "summary": "RHBZ#1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26146" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers" }, { "cve": "CVE-2020-26147", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960504" } ], "notes": [ { "category": "description", "text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reassembling mixed encrypted/plaintext fragments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "RHBZ#1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26147" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: reassembling mixed encrypted/plaintext fragments" }, { "cve": "CVE-2020-29368", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903244" } ], "notes": [ { "category": "description", "text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29368" }, { "category": "external", "summary": "RHBZ#1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29368" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368" } ], "release_date": "2020-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check" }, { "cve": "CVE-2020-29660", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906522" } ], "notes": [ { "category": "description", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "RHBZ#1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29660" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660" } ], "release_date": "2020-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free" }, { "cve": "CVE-2020-36158", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913348" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "RHBZ#1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value" }, { "cve": "CVE-2020-36312", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2021-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1947991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36312" }, { "category": "external", "summary": "RHBZ#1947991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36312" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312" } ], "release_date": "2020-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c" }, { "cve": "CVE-2020-36386", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1969489" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36386" }, { "category": "external", "summary": "RHBZ#1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c" }, { "cve": "CVE-2021-0129", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965038" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0129" }, { "category": "external", "summary": "RHBZ#1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129" } ], "release_date": "2021-06-08T03:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability." }, { "cve": "CVE-2021-3348", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921958" } ], "notes": [ { "category": "description", "text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "RHBZ#1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348" }, { "category": "external", "summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/", "url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/" } ], "release_date": "2021-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c" }, { "acknowledgments": [ { "names": [ "Ryota Shiga" ] } ], "cve": "CVE-2021-3489", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959559" } ], "notes": [ { "category": "description", "text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "RHBZ#1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10", "url": "https://www.openwall.com/lists/oss-security/2021/05/11/10" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation" }, { "acknowledgments": [ { "names": [ "HaoXiong, LinMa" ], "organization": "ckSec" } ], "cve": "CVE-2021-3564", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964139" } ], "notes": [ { "category": "description", "text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3564" }, { "category": "external", "summary": "RHBZ#1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/25/1" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails" }, { "cve": "CVE-2021-3573", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966578" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function hci_sock_bound_ioctl()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3573" }, { "category": "external", "summary": "RHBZ#1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2", "url": "https://www.openwall.com/lists/oss-security/2021/06/08/2" } ], "release_date": "2021-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function hci_sock_bound_ioctl()" }, { "cve": "CVE-2021-3600", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981954" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: eBPF 32-bit source register truncation on div/mod", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3600" }, { "category": "external", "summary": "RHBZ#1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600" }, { "category": "external", "summary": "https://lore.kernel.org/patchwork/patch/1379497/", "url": "https://lore.kernel.org/patchwork/patch/1379497/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1", "url": "https://www.openwall.com/lists/oss-security/2021/06/23/1" } ], "release_date": "2021-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: eBPF 32-bit source register truncation on div/mod" }, { "cve": "CVE-2021-3635", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1976946" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3635" }, { "category": "external", "summary": "RHBZ#1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635" } ], "release_date": "2021-08-06T04:47:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50" }, { "cve": "CVE-2021-3659", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2021-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1975949" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3659" }, { "category": "external", "summary": "RHBZ#1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8" } ], "release_date": "2021-04-06T19:22:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c" }, { "acknowledgments": [ { "names": [ "Haoran Luo" ], "organization": "Chaitin Tech" } ], "cve": "CVE-2021-3679", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989165" } ], "notes": [ { "category": "description", "text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS in rb_per_cpu_empty()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3679" }, { "category": "external", "summary": "RHBZ#1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/", "url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/" } ], "release_date": "2021-07-20T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS in rb_per_cpu_empty()" }, { "acknowledgments": [ { "names": [ "Miklos Szeredi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-3732", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3732" }, { "category": "external", "summary": "RHBZ#1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d" } ], "release_date": "2021-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files" }, { "acknowledgments": [ { "names": [ "Loris Reiff" ] } ], "cve": "CVE-2021-20194", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912683" } ], "notes": [ { "category": "description", "text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20194" }, { "category": "external", "summary": "RHBZ#1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194" } ], "release_date": "2021-01-22T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()" }, { "cve": "CVE-2021-20239", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1923636" } ], "notes": [ { "category": "description", "text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20239" }, { "category": "external", "summary": "RHBZ#1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20239" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239" } ], "release_date": "2021-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure" }, { "acknowledgments": [ { "names": [ "Or Cohen" ], "organization": "Palo Alto Networks" } ], "cve": "CVE-2021-23133", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1948772" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sctp_destroy_sock list_del", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "RHBZ#1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b" } ], "release_date": "2021-04-18T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sctp_destroy_sock list_del" }, { "cve": "CVE-2021-28950", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941762" } ], "notes": [ { "category": "description", "text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28950" }, { "category": "external", "summary": "RHBZ#1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950" } ], "release_date": "2021-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode" }, { "cve": "CVE-2021-28971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941784" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "RHBZ#1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28971" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c" }, { "cve": "CVE-2021-29155", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1951595" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29155" }, { "category": "external", "summary": "RHBZ#1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4", "url": "https://www.openwall.com/lists/oss-security/2021/04/18/4" } ], "release_date": "2021-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory" }, { "cve": "CVE-2021-29646", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945345" } ], "notes": [ { "category": "description", "text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29646" }, { "category": "external", "summary": "RHBZ#1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646" } ], "release_date": "2021-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c" }, { "cve": "CVE-2021-29650", "cwe": { "id": "CWE-662", "name": "Improper Synchronization" }, "discovery_date": "2021-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945388" } ], "notes": [ { "category": "description", "text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29650" }, { "category": "external", "summary": "RHBZ#1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1" } ], "release_date": "2021-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS" }, { "acknowledgments": [ { "names": [ "Manfred Paul" ], "organization": "RedRocket CTF team" } ], "cve": "CVE-2021-31440", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2021-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964028" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: local escalation of privileges in handling of eBPF programs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31440" }, { "category": "external", "summary": "RHBZ#1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36" }, { "category": "external", "summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier", "url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: local escalation of privileges in handling of eBPF programs" }, { "cve": "CVE-2021-31829", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1957788" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31829" }, { "category": "external", "summary": "RHBZ#1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31829" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829" } ], "release_date": "2021-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory" }, { "cve": "CVE-2021-31916", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1946965" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31916" }, { "category": "external", "summary": "RHBZ#1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a", "url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2021/q1/268", "url": "https://seclists.org/oss-sec/2021/q1/268" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c" }, { "cve": "CVE-2021-33033", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1961300" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c", "title": "Vulnerability summary" }, { "category": "other", "text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33033" }, { "category": "external", "summary": "RHBZ#1961300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033" } ], "release_date": "2021-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c" }, { "cve": "CVE-2021-33200", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965458" } ], "notes": [ { "category": "description", "text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "RHBZ#1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33200" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/27/1" } ], "release_date": "2021-05-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier" }, { "cve": "CVE-2021-46905", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266253" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL-deref on disconnect regression", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-46905" }, { "category": "external", "summary": "RHBZ#2266253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46905" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T" } ], "release_date": "2024-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL-deref on disconnect regression" }, { "cve": "CVE-2022-20166", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122089" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible buffer overflow in sysfs reading", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-20166" }, { "category": "external", "summary": "RHBZ#2122089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166" } ], "release_date": "2022-08-15T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible buffer overflow in sysfs reading" } ] }
rhsa-2021:4356
Vulnerability from csaf_redhat
Published
2021-11-09 18:06
Modified
2025-08-03 13:09
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)
* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)
* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)
* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)
* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)
* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)
* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)
* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)
* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)
* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)
* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)
* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)
* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)
* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)
* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)
* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)
* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)
* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)
* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)
* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)
* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)
* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)
* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)
* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)
* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)
* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)
* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)
* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)
* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)
* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)
* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)
* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)
* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)
* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)
* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)
* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)
* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)
* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)
* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)
* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)
* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)
* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)\n* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)\n* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4356", "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1509204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509204" }, { "category": "external", "summary": "1793880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793880" }, { "category": "external", "summary": "1816493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816493" }, { "category": "external", "summary": "1894101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894101" }, { "category": "external", "summary": "1900844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844" }, { "category": "external", "summary": "1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "1915825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915825" }, { "category": "external", "summary": "1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "1933527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933527" }, { "category": "external", "summary": "1939341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939341" }, { "category": "external", "summary": "1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "1953847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953847" }, { "category": "external", "summary": "1954588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954588" }, { "category": "external", "summary": "1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "1960708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960708" }, { "category": "external", "summary": "1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "1965360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965360" }, { "category": "external", "summary": "1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "1971101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971101" }, { "category": "external", "summary": "1972278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972278" }, { "category": "external", "summary": "1974627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974627" }, { "category": "external", "summary": "1975182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975182" }, { "category": "external", "summary": "1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "1976679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976679" }, { "category": "external", "summary": "1976699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976699" }, { "category": "external", "summary": "1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "1976969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976969" }, { "category": "external", "summary": "1977162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977162" }, { "category": "external", "summary": "1977422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977422" }, { "category": "external", "summary": "1977537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977537" }, { "category": "external", "summary": "1977850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977850" }, { "category": "external", "summary": "1978369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978369" }, { "category": "external", "summary": "1979070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979070" }, { "category": "external", "summary": "1979680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979680" }, { "category": "external", "summary": "1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "1986138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986138" }, { "category": "external", "summary": "1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "1989999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989999" }, { "category": "external", "summary": "1991976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991976" }, { "category": "external", "summary": "1992700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992700" }, { "category": "external", "summary": "1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "external", "summary": "1996854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996854" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4356.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-03T13:09:18+00:00", "generator": { "date": "2025-08-03T13:09:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2021:4356", "initial_release_date": "2021-11-09T18:06:54+00:00", "revision_history": [ { "date": "2021-11-09T18:06:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T18:06:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T13:09:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-348.el8.aarch64", "product_id": "bpftool-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-348.el8.aarch64", "product_id": "kernel-core-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-348.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-348.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.aarch64", "product": { "name": "perf-0:4.18.0-348.el8.aarch64", "product_id": "perf-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-348.el8.aarch64", "product_id": "python3-perf-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-348.el8.ppc64le", "product_id": "bpftool-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.ppc64le", "product": { "name": "perf-0:4.18.0-348.el8.ppc64le", "product_id": "perf-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-348.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-348.el8.x86_64", "product_id": "bpftool-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-348.el8.x86_64", "product_id": "kernel-core-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-348.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-348.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.x86_64", "product": { "name": "perf-0:4.18.0-348.el8.x86_64", "product_id": "perf-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-348.el8.x86_64", "product_id": "python3-perf-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.s390x", "product": { "name": "bpftool-0:4.18.0-348.el8.s390x", "product_id": "bpftool-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-0:4.18.0-348.el8.s390x", "product_id": "kernel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-348.el8.s390x", "product_id": "kernel-core-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-348.el8.s390x", "product_id": "kernel-devel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-348.el8.s390x", "product_id": "kernel-headers-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-348.el8.s390x", "product_id": "kernel-modules-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-348.el8.s390x", "product_id": "kernel-tools-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.s390x", "product": { "name": "perf-0:4.18.0-348.el8.s390x", "product_id": "perf-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-348.el8.s390x", "product_id": "python3-perf-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.src", "product": { "name": "kernel-0:4.18.0-348.el8.src", "product_id": "kernel-0:4.18.0-348.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "product": { "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "product_id": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-348.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-348.el8.noarch", "product_id": "kernel-doc-0:4.18.0-348.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src" }, "product_reference": "kernel-0:4.18.0-348.el8.src", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src" }, "product_reference": "kernel-0:4.18.0-348.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14615", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-01-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789209" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Intel graphics card information leak.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "RHBZ#1789209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Intel graphics card information leak." }, { "cve": "CVE-2019-15794", "cwe": { "id": "CWE-672", "name": "Operation on a Resource after Expiration or Release" }, "discovery_date": "2020-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831055" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. In Overlayfs, vma-\u003evm_file was replaced in the mmap handlers and, on errors, the original value is not restored. A local attacker with special user privilege (or root) can cause a kernel internal information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15794" }, { "category": "external", "summary": "RHBZ#1831055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831055" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15794", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15794" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15794" } ], "release_date": "2019-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow" }, { "cve": "CVE-2020-0427", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919893" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads in pinctrl subsystem.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "RHBZ#1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427" } ], "release_date": "2020-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads in pinctrl subsystem." }, { "cve": "CVE-2020-24502", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930379" } ], "notes": [ { "category": "description", "text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24502" }, { "category": "external", "summary": "RHBZ#1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24503", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930381" } ], "notes": [ { "category": "description", "text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24503" }, { "category": "external", "summary": "RHBZ#1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24504", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930376" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24504" }, { "category": "external", "summary": "RHBZ#1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24586", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959642" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Fragmentation cache not cleared on reconnection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "RHBZ#1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-12T01:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Fragmentation cache not cleared on reconnection" }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959654" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Reassembling fragments encrypted under different keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "RHBZ#1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24587" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-11T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Reassembling fragments encrypted under different keys" }, { "cve": "CVE-2020-24588", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959657" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "RHBZ#1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24588" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame" }, { "cve": "CVE-2020-26139", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959663" } ], "notes": [ { "category": "description", "text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Forwarding EAPOL from unauthenticated wifi client", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "RHBZ#1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26139" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Forwarding EAPOL from unauthenticated wifi client" }, { "cve": "CVE-2020-26140", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960490" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext data frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26140" }, { "category": "external", "summary": "RHBZ#1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26140" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext data frames in protected networks" }, { "cve": "CVE-2020-26141", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960492" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: not verifying TKIP MIC of fragmented frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "RHBZ#1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: not verifying TKIP MIC of fragmented frames" }, { "cve": "CVE-2020-26143", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960496" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting fragmented plaintext frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26143" }, { "category": "external", "summary": "RHBZ#1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting fragmented plaintext frames in protected networks" }, { "cve": "CVE-2020-26144", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960498" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26144" }, { "category": "external", "summary": "RHBZ#1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header" }, { "cve": "CVE-2020-26145", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960500" } ], "notes": [ { "category": "description", "text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext broadcast fragments as full frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "RHBZ#1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26145" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext broadcast fragments as full frames" }, { "cve": "CVE-2020-26146", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960502" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26146" }, { "category": "external", "summary": "RHBZ#1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26146" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers" }, { "cve": "CVE-2020-26147", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960504" } ], "notes": [ { "category": "description", "text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reassembling mixed encrypted/plaintext fragments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "RHBZ#1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26147" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: reassembling mixed encrypted/plaintext fragments" }, { "acknowledgments": [ { "names": [ "Daniel Axtens" ], "organization": "IBM" } ], "cve": "CVE-2020-27777", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2020-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1900844" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27777" }, { "category": "external", "summary": "RHBZ#1900844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27777" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1", "url": "https://www.openwall.com/lists/oss-security/2020/10/09/1" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2", "url": "https://www.openwall.com/lists/oss-security/2020/11/23/2" } ], "release_date": "2020-10-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity" }, { "cve": "CVE-2020-29368", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903244" } ], "notes": [ { "category": "description", "text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29368" }, { "category": "external", "summary": "RHBZ#1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29368" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368" } ], "release_date": "2020-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check" }, { "cve": "CVE-2020-29660", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906522" } ], "notes": [ { "category": "description", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "RHBZ#1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29660" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660" } ], "release_date": "2020-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free" }, { "cve": "CVE-2020-36158", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913348" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "RHBZ#1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value" }, { "cve": "CVE-2020-36312", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2021-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1947991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36312" }, { "category": "external", "summary": "RHBZ#1947991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36312" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312" } ], "release_date": "2020-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c" }, { "cve": "CVE-2020-36386", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1969489" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36386" }, { "category": "external", "summary": "RHBZ#1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c" }, { "cve": "CVE-2021-0129", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965038" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0129" }, { "category": "external", "summary": "RHBZ#1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129" } ], "release_date": "2021-06-08T03:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability." }, { "cve": "CVE-2021-3348", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921958" } ], "notes": [ { "category": "description", "text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "RHBZ#1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348" }, { "category": "external", "summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/", "url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/" } ], "release_date": "2021-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c" }, { "cve": "CVE-2021-3444", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1942667" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the Linux kernel\u0027s implementation of the eBPF code verifier in the way a user running the eBPF script uses mod32 destination register truncation when the source register was known to be 0. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: bpf verifier incorrect mod32 truncation", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3444" }, { "category": "external", "summary": "RHBZ#1942667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942667" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3444", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3444" } ], "release_date": "2021-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: bpf verifier incorrect mod32 truncation" }, { "acknowledgments": [ { "names": [ "Ryota Shiga" ] } ], "cve": "CVE-2021-3489", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959559" } ], "notes": [ { "category": "description", "text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "RHBZ#1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10", "url": "https://www.openwall.com/lists/oss-security/2021/05/11/10" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation" }, { "acknowledgments": [ { "names": [ "HaoXiong, LinMa" ], "organization": "ckSec" } ], "cve": "CVE-2021-3564", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964139" } ], "notes": [ { "category": "description", "text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3564" }, { "category": "external", "summary": "RHBZ#1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/25/1" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails" }, { "cve": "CVE-2021-3573", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966578" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function hci_sock_bound_ioctl()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3573" }, { "category": "external", "summary": "RHBZ#1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2", "url": "https://www.openwall.com/lists/oss-security/2021/06/08/2" } ], "release_date": "2021-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function hci_sock_bound_ioctl()" }, { "cve": "CVE-2021-3600", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981954" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: eBPF 32-bit source register truncation on div/mod", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3600" }, { "category": "external", "summary": "RHBZ#1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600" }, { "category": "external", "summary": "https://lore.kernel.org/patchwork/patch/1379497/", "url": "https://lore.kernel.org/patchwork/patch/1379497/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1", "url": "https://www.openwall.com/lists/oss-security/2021/06/23/1" } ], "release_date": "2021-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: eBPF 32-bit source register truncation on div/mod" }, { "cve": "CVE-2021-3635", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1976946" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3635" }, { "category": "external", "summary": "RHBZ#1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635" } ], "release_date": "2021-08-06T04:47:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50" }, { "cve": "CVE-2021-3659", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2021-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1975949" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3659" }, { "category": "external", "summary": "RHBZ#1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8" } ], "release_date": "2021-04-06T19:22:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c" }, { "acknowledgments": [ { "names": [ "Haoran Luo" ], "organization": "Chaitin Tech" } ], "cve": "CVE-2021-3679", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989165" } ], "notes": [ { "category": "description", "text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS in rb_per_cpu_empty()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3679" }, { "category": "external", "summary": "RHBZ#1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/", "url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/" } ], "release_date": "2021-07-20T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS in rb_per_cpu_empty()" }, { "acknowledgments": [ { "names": [ "Miklos Szeredi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-3732", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3732" }, { "category": "external", "summary": "RHBZ#1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d" } ], "release_date": "2021-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files" }, { "cve": "CVE-2021-4442", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-08-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2308455" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: add sanity tests to TCP_QUEUE_SEQ\n\nQingyu Li reported a syzkaller bug where the repro\nchanges RCV SEQ _after_ restoring data in the receive queue.\n\nmprotect(0x4aa000, 12288, PROT_READ) = 0\nmmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000\nmmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000\nmmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000\nsocket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0\nconnect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, \"::1\", \u0026sin6_addr), sin6_scope_id=0}, 28) = 0\nsetsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0\nsendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=\"0x0000000000000003\\0\\0\", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0\nsetsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0\nrecvfrom(3, NULL, 20, 0, NULL, NULL) = -1 ECONNRESET (Connection reset by peer)\n\nsyslog shows:\n[ 111.205099] TCP recvmsg seq # bug 2: copied 80, seq 0, rcvnxt 80, fl 0\n[ 111.207894] WARNING: CPU: 1 PID: 356 at net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0\n\nThis should not be allowed. TCP_QUEUE_SEQ should only be used\nwhen queues are empty.\n\nThis patch fixes this case, and the tx path as well.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is fixed in RHEL-8.5 and above\n~~~\nin (rhel-8.5, rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) tcp: add sanity tests to TCP_QUEUE_SEQ\n~~~", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4442" }, { "category": "external", "summary": "RHBZ#2308455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4442", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T" } ], "release_date": "2024-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ" }, { "acknowledgments": [ { "names": [ "Loris Reiff" ] } ], "cve": "CVE-2021-20194", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912683" } ], "notes": [ { "category": "description", "text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20194" }, { "category": "external", "summary": "RHBZ#1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194" } ], "release_date": "2021-01-22T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()" }, { "cve": "CVE-2021-20239", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1923636" } ], "notes": [ { "category": "description", "text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20239" }, { "category": "external", "summary": "RHBZ#1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20239" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239" } ], "release_date": "2021-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure" }, { "acknowledgments": [ { "names": [ "Or Cohen" ], "organization": "Palo Alto Networks" } ], "cve": "CVE-2021-23133", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1948772" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sctp_destroy_sock list_del", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "RHBZ#1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b" } ], "release_date": "2021-04-18T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sctp_destroy_sock list_del" }, { "cve": "CVE-2021-28950", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941762" } ], "notes": [ { "category": "description", "text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28950" }, { "category": "external", "summary": "RHBZ#1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950" } ], "release_date": "2021-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode" }, { "cve": "CVE-2021-28971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941784" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "RHBZ#1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28971" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c" }, { "cve": "CVE-2021-29155", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1951595" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29155" }, { "category": "external", "summary": "RHBZ#1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4", "url": "https://www.openwall.com/lists/oss-security/2021/04/18/4" } ], "release_date": "2021-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory" }, { "cve": "CVE-2021-29646", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945345" } ], "notes": [ { "category": "description", "text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29646" }, { "category": "external", "summary": "RHBZ#1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646" } ], "release_date": "2021-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c" }, { "cve": "CVE-2021-29650", "cwe": { "id": "CWE-662", "name": "Improper Synchronization" }, "discovery_date": "2021-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945388" } ], "notes": [ { "category": "description", "text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29650" }, { "category": "external", "summary": "RHBZ#1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1" } ], "release_date": "2021-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS" }, { "cve": "CVE-2021-29657", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2021-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995153" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A KVM guest on AMD can launch a nested guest without the Intercept VMRUN control bit by exploiting a TOCTOU vulnerability in nested_svm_vmrun. A malicious guest could use this flaw to gain unrestricted access to host MSRs, possibly leading to guest-to-host escape scenario.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access", "title": "Vulnerability summary" }, { "category": "other", "text": "The nested virtualization feature is not enabled by default up to Red Hat Enterprise Linux 8.4. Most importantly, Red Hat currently provides nested virtualization only as a Technology Preview, and is therefore unsupported for production use. For additional details please see https://access.redhat.com/solutions/21101 and https://access.redhat.com/support/offerings/techpreview.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29657" }, { "category": "external", "summary": "RHBZ#1995153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29657", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29657" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29657" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2177", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2177" } ], "release_date": "2021-03-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "This vulnerability can be mitigated by disabling the nested virtualization feature:\n```\n# modprobe -r kvm_amd\n# modprobe kvm_amd nested=0\n```", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access" }, { "acknowledgments": [ { "names": [ "Manfred Paul" ], "organization": "RedRocket CTF team" } ], "cve": "CVE-2021-31440", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2021-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964028" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: local escalation of privileges in handling of eBPF programs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31440" }, { "category": "external", "summary": "RHBZ#1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36" }, { "category": "external", "summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier", "url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: local escalation of privileges in handling of eBPF programs" }, { "cve": "CVE-2021-31829", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1957788" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31829" }, { "category": "external", "summary": "RHBZ#1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31829" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829" } ], "release_date": "2021-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory" }, { "cve": "CVE-2021-31916", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1946965" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31916" }, { "category": "external", "summary": "RHBZ#1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a", "url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2021/q1/268", "url": "https://seclists.org/oss-sec/2021/q1/268" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c" }, { "cve": "CVE-2021-33033", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1961300" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c", "title": "Vulnerability summary" }, { "category": "other", "text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33033" }, { "category": "external", "summary": "RHBZ#1961300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033" } ], "release_date": "2021-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c" }, { "cve": "CVE-2021-33098", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2068236" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system\u2019s kernel if they set the MTU of the VF device to an unsupported value.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33098" }, { "category": "external", "summary": "RHBZ#2068236", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068236" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33098", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33098" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098" } ], "release_date": "2021-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access" }, { "cve": "CVE-2021-33200", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965458" } ], "notes": [ { "category": "description", "text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "RHBZ#1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33200" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/27/1" } ], "release_date": "2021-05-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier" }, { "cve": "CVE-2021-46905", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266253" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL-deref on disconnect regression", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-46905" }, { "category": "external", "summary": "RHBZ#2266253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46905" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T" } ], "release_date": "2024-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL-deref on disconnect regression" }, { "cve": "CVE-2021-46983", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-02-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266906" } ], "notes": [ { "category": "description", "text": "A flaw was found in an error-handling function in the Linux kernel\u0027s NVMe driver. This flaw allows an attacker with control over NVMe links to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-46983" }, { "category": "external", "summary": "RHBZ#2266906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-46983", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u", "url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u" } ], "release_date": "2024-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error" }, { "cve": "CVE-2021-47011", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-02-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266847" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: memcontrol: slab: fix obtain a reference to a freeing memcg\n\nPatch series \"Use obj_cgroup APIs to charge kmem pages\", v5.\n\nSince Roman\u0027s series \"The new cgroup slab memory controller\" applied.\nAll slab objects are charged with the new APIs of obj_cgroup. The new\nAPIs introduce a struct obj_cgroup to charge slab objects. It prevents\nlong-living objects from pinning the original memory cgroup in the\nmemory. But there are still some corner objects (e.g. allocations\nlarger than order-1 page on SLUB) which are not charged with the new\nAPIs. Those objects (include the pages which are allocated from buddy\nallocator directly) are charged as kmem pages which still hold a\nreference to the memory cgroup.\n\nE.g. We know that the kernel stack is charged as kmem pages because the\nsize of the kernel stack can be greater than 2 pages (e.g. 16KB on\nx86_64 or arm64). If we create a thread (suppose the thread stack is\ncharged to memory cgroup A) and then move it from memory cgroup A to\nmemory cgroup B. Because the kernel stack of the thread hold a\nreference to the memory cgroup A. The thread can pin the memory cgroup\nA in the memory even if we remove the cgroup A. If we want to see this\nscenario by using the following script. We can see that the system has\nadded 500 dying cgroups (This is not a real world issue, just a script\nto show that the large kmallocs are charged as kmem pages which can pin\nthe memory cgroup in the memory).\n\n\t#!/bin/bash\n\n\tcat /proc/cgroups | grep memory\n\n\tcd /sys/fs/cgroup/memory\n\techo 1 \u003e memory.move_charge_at_immigrate\n\n\tfor i in range{1..500}\n\tdo\n\t\tmkdir kmem_test\n\t\techo $$ \u003e kmem_test/cgroup.procs\n\t\tsleep 3600 \u0026\n\t\techo $$ \u003e cgroup.procs\n\t\techo `cat kmem_test/cgroup.procs` \u003e cgroup.procs\n\t\trmdir kmem_test\n\tdone\n\n\tcat /proc/cgroups | grep memory\n\nThis patchset aims to make those kmem pages to drop the reference to\nmemory cgroup by using the APIs of obj_cgroup. Finally, we can see that\nthe number of the dying cgroups will not increase if we run the above test\nscript.\n\nThis patch (of 7):\n\nThe rcu_read_lock/unlock only can guarantee that the memcg will not be\nfreed, but it cannot guarantee the success of css_get (which is in the\nrefill_stock when cached memcg changed) to memcg.\n\n rcu_read_lock()\n memcg = obj_cgroup_memcg(old)\n __memcg_kmem_uncharge(memcg)\n refill_stock(memcg)\n if (stock-\u003ecached != memcg)\n // css_get can change the ref counter from 0 back to 1.\n css_get(\u0026memcg-\u003ecss)\n rcu_read_unlock()\n\nThis fix is very like the commit:\n\n eefbfa7fd678 (\"mm: memcg/slab: fix use after free in obj_cgroup_charge\")\n\nFix this by holding a reference to the memcg which is passed to the\n__memcg_kmem_uncharge() before calling __memcg_kmem_uncharge().", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: memcontrol: slab: fix obtain a reference to a freeing memcg", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47011" }, { "category": "external", "summary": "RHBZ#2266847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266847" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47011", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47011" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47011" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u", "url": "https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u" } ], "release_date": "2024-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mm: memcontrol: slab: fix obtain a reference to a freeing memcg" }, { "cve": "CVE-2021-47080", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2024-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267533" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Prevent divide-by-zero error triggered by the user\n\nThe user_entry_size is supplied by the user and later used as a\ndenominator to calculate number of entries. The zero supplied by the user\nwill trigger the following divide-by-zero error:\n\n divide error: 0000 [#1] SMP KASAN PTI\n CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510\n Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff \u003c49\u003e f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b\n RSP: 0018:ffff88810416f828 EFLAGS: 00010246\n RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d\n RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000\n RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f\n R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000\n R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0\n FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0\n ib_uverbs_cmd_verbs+0x1546/0x1940\n ib_uverbs_ioctl+0x186/0x240\n __x64_sys_ioctl+0x38a/0x1220\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47080" }, { "category": "external", "summary": "RHBZ#2267533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47080", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u", "url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u" } ], "release_date": "2024-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user" }, { "cve": "CVE-2022-20166", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122089" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible buffer overflow in sysfs reading", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-20166" }, { "category": "external", "summary": "RHBZ#2122089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166" } ], "release_date": "2022-08-15T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible buffer overflow in sysfs reading" }, { "cve": "CVE-2022-50042", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2025-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2373691" } ], "notes": [ { "category": "description", "text": "A flaw was found in the netlink driver in the Linux kernel. A memory leak can occur when allocated memory is not released in certain error cases, potentially impacting system performance and resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: genl: fix error path memory leak in policy dumping", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue has been fixed in Red Hat Enterprise Linux 8.5, 9.2 and 9.3 via RHSA-2021:4356 [1], RHSA-2023:7370 [2] and RHSA-2023:6583 [3], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2021:4356\n\n[2]. https://access.redhat.com/errata/RHSA-2023:7370\n\n[3]. https://access.redhat.com/errata/RHSA-2023:6583", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-50042" }, { "category": "external", "summary": "RHBZ#2373691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-50042", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50042" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50042", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50042" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025061843-CVE-2022-50042-7d6f@gregkh/T" } ], "release_date": "2025-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: net: genl: fix error path memory leak in policy dumping" }, { "cve": "CVE-2022-50073", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2373494" } ], "notes": [ { "category": "description", "text": "A flaw was found in the tap module in the Linux kernel. A NULL pointer dereference can be triggered due to a missing initialization, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue has been fixed in Red Hat Enterprise Linux 8.5 and 9.5 via RHSA-2021:4356 [1] and RHSA-2024:9315 [2], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2021:4356\n\n[2]. https://access.redhat.com/errata/RHSA-2024:9315", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-50073" }, { "category": "external", "summary": "RHBZ#2373494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373494" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-50073", "url": "https://www.cve.org/CVERecord?id=CVE-2022-50073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50073" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2025061854-CVE-2022-50073-7199@gregkh/T" } ], "release_date": "2025-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb-\u003edev is null" } ] }
ghsa-7hqh-xccf-8jp4
Vulnerability from github
Published
2022-05-24 17:40
Modified
2022-05-24 17:40
Severity ?
VLAI Severity ?
Details
nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
{ "affected": [], "aliases": [ "CVE-2021-3348" ], "database_specific": { "cwe_ids": [ "CWE-362", "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-02-01T04:15:00Z", "severity": "MODERATE" }, "details": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", "id": "GHSA-7hqh-xccf-8jp4", "modified": "2022-05-24T17:40:44Z", "published": "2022-05-24T17:40:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2021/01/28/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/02/01/1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2021-3348
Vulnerability from fkie_nvd
Published
2021-02-01 04:15
Modified
2024-11-21 06:21
Severity ?
Summary
nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/02/01/1 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258 | Mailing List, Patch, Vendor Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html | Third Party Advisory | |
cve@mitre.org | https://www.openwall.com/lists/oss-security/2021/01/28/3 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/02/01/1 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258 | Mailing List, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openwall.com/lists/oss-security/2021/01/28/3 | Mailing List, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A8E7F05-FF68-4B1A-BE6E-F802E06C69FC", "versionEndIncluding": "5.10.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71." }, { "lang": "es", "value": "En la funci\u00f3n nbd_add_socket en el archivo drivers/block/nbd.c en el kernel de Linux versiones hasta 5.10.12, presenta un uso de la memoria previamente liberada de ndb_queue_rq que podr\u00eda ser desencadenado por atacantes locales (con acceso al dispositivo nbd) por medio de una petici\u00f3n de E/S en un punto determinado durante la configuraci\u00f3n del dispositivo, tambi\u00e9n se conoce como CID-b98e762e3d71" } ], "id": "CVE-2021-3348", "lastModified": "2024-11-21T06:21:21.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-01T04:15:14.430", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/02/01/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2021/01/28/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/02/01/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b98e762e3d71e893b221f871825dc64694cfb258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2021/01/28/3" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" }, { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…